[45126] in Cypherpunks

home help back first fref pref prev next nref lref last post

MD4

daemon@ATHENA.MIT.EDU (SINCLAIR DOUGLAS N)
Sun Dec 10 21:00:12 1995

From: SINCLAIR  DOUGLAS N <sinclai@ecf.toronto.edu>
To: daw@quito.CS.Berkeley.EDU (David A Wagner)
Date: 	Sun, 10 Dec 1995 20:48:21 -0500
Cc: cypherpunks@toad.com
In-Reply-To: <199512102320.SAA08162@bb.hks.net> from "David A Wagner" at Dec 10, 95 06:20:38 pm

> SINCLAIR  DOUGLAS N <sinclai@ecf.toronto.edu> wrote:
> > My understanding was that MD4 had been broken once, at the cost of 
> > much computer time.
> 
> Not *that* much computer time...
I stand corrected.  I've not read the original paper.

> As far as I know, the difficulty of inverting MD4 is still an open
> problem -- but why would you want to use a broken algorithm like MD4
> when you can use MD2, MD5, or SHA?
Granted.  A brute force attack on MD4 takes 2^64 times more operations
to invert it than it does to find matching pairs if I remember correctly.
However a clever algorithm would reduce that.

Of course with MD5 as a plug-in replacement that's only 30% slower
this isn't a big problem.  Looks like the safety belts are worth while
after all.

home help back first fref pref prev next nref lref last post