[16558] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: The Pointlessness of the MD5 "attacks"

daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Dec 22 11:16:05 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: Cryptography <cryptography@metzdowd.com>
Date: Wed, 15 Dec 2004 12:13:08 -0800
In-reply-to: <41BFFB11.70000@algroup.co.uk>

    --
On 15 Dec 2004 at 8:51, Ben Laurie wrote:
> People seem to be having a hard time grasping what I'm trying
> to say, so perhaps I should phrase it as a challenge: find me
> a scenario where you can use an MD5 collision to mount an
> attack in which I could not mount an equally effective attack
> without using an MD5 collision.

I could circulate watermarked versions of copyrighted material
without it being apparent that they were watermarked. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     brRAUUDlwL/ZhPKf51gh0pzlr6ISDbBPNAbnzJfI
     41Hx46udB9H+g9Lkm68G20fQMC+F6YzLxJhmwuZu4


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post