[16583] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: The Pointlessness of the MD5 "attacks"

daemon@ATHENA.MIT.EDU (Ben Laurie)
Wed Dec 22 12:37:36 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 22 Dec 2004 17:31:24 +0000
From: Ben Laurie <ben@algroup.co.uk>
To: "James A. Donald" <jamesd@echeque.com>
Cc: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <41C02A54.24654.3AC6CE9@localhost>

James A. Donald wrote:
>     --
> On 15 Dec 2004 at 8:51, Ben Laurie wrote:
> 
>>People seem to be having a hard time grasping what I'm trying
>>to say, so perhaps I should phrase it as a challenge: find me
>>a scenario where you can use an MD5 collision to mount an
>>attack in which I could not mount an equally effective attack
>>without using an MD5 collision.
> 
> 
> I could circulate watermarked versions of copyrighted material
> without it being apparent that they were watermarked. 

That was the attack I was not disputing :-)

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post