[144761] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Certainty

daemon@ATHENA.MIT.EDU (Greg Rose)
Fri Aug 21 17:11:29 2009

Cc: Greg Rose <ggr@qualcomm.com>, "Perry E. Metzger" <perry@piermont.com>,
        Cryptography List <cryptography@metzdowd.com>
From: Greg Rose <ggr@qualcomm.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <p06240807c6b22bf61439@[10.20.30.158]>
Date: Wed, 19 Aug 2009 21:02:39 -0700


On 2009 Aug 19, at 3:28 , Paul Hoffman wrote:

> At 5:28 PM -0400 8/19/09, Perry E. Metzger wrote:
>> I believe attacks on Git's use of SHA-1 would require second pre- 
>> image
>> attacks, and I don't think anyone has demonstrated such a thing for
>> SHA-1 at this point. None the less, I agree that it would be better  
>> if
>> Git eventually used better hash functions. Attacks only get better  
>> with
>> time, and SHA-1 is certainly creaking.
>
> I understand that "creaking" is not a technical cryptography term,  
> but "certainly" is. When do we become "certain" that devastating  
> attacks on one feature of hash functions (collision resistance) have  
> any effect at all on even weak attacks on a different feature  
> (either first or second preimages)?
>
> This is a serious question. Has anyone seen any research that took  
> some of the excellent research on collision resistance and used it  
> directly for preimage attacks, even with greatly reduced rounds?

Not directly, as far as I know. But some research and success on  
preimages, yes.
>
> The longer that MD5 goes without any hint of preimage attacks, the  
> less "certain" I am that collision attacks are even related to  
> preimage attacks.

They aren't particularly related, but there was a presentation at  
Eurocrypt about MD5 preimages earlier this year. Or maybe it was MD4...

Greg.

>
> Of course, I still believe in hash algorithm agility: regardless of  
> how preimage attacks will be found, we need to be able to deal with  
> them immediately.
>
> --Paul Hoffman, Director
> --VPN Consortium
>
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post