[14316] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

A quick question...

daemon@ATHENA.MIT.EDU (Paul Walker)
Sun Sep 28 12:17:27 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 27 Sep 2003 23:53:08 +0100
From: Paul Walker <paul@black-sun.demon.co.uk>
To: cryptography@metzdowd.com

Hi,

Apologies in advance for the vagueness of the question...

Talking to a friend the other day, he was telling me about a potential
loophole with SHA-1 hashes protected by an RSA signature. Basically, he
seemed to think that with an SHA hash of a suitable length (say, 2^20), the
hash could be cubed and still not 'fail', since it was below the key
modulus. If you change the hash length, this problem doesn't occur.

I'm unconvinced for a number of reasons - this sounds very strange to me.
Not least because, even if cubing the hash does work (why cubing?), since
it's infeasible to create a binary which produces a given hash it still
doesn't help. 

Could someone help shed some light on this? Either pointing me at a paper
documenting the hole, or confirming that it's gibberish (at which point I'll
go back to work and ask him for more details :).

Thanks,

-- 
Paul

The ability to quote is a serviceable substitute for wit.
 -- W. Somerset Maugham

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post