MD5 Collisions...

Iang iang at iang.org
Tue Dec 4 04:43:51 PST 2007


Colin Percival wrote:
> Norberto Meijome wrote:
>> should some kind of advisory be sent to advise people not to rely solely on MD5 checksums? Maybe an update to the man page is due ? :
>>
>> "     
>> MD5 has not yet (2001-09-03) been broken, but sufficient attacks have
>>      been made that its security is in some doubt.  The attacks on MD5 are in
>>      the nature of finding ``collisions'' -- that is, multiple inputs which
>>      hash to the same value; it is still unlikely for an attacker to be able
>>      to determine the exact original input given a hash value.
>> "
> 
> I fail to see how the man page is incorrect here.  What do you think it should
> be saying instead?

Perhaps, 1st two paras:


==============
Md5 is a cryptographic message digest algorithm.  It takes 
as input a message of arbitrary length and produces as 
output a 128-bit ``fingerprint'' or ``digest'' of the input. 
  Such algorithms are intended for applications where a 
large file must be ``compressed'' in a secure manner, 
suitable as a digital signature or as an input to a 
public-key cryptosystem for digital signature or encryption 
purposes.

MD5 is no longer recommended as a cryptographic message 
digest algorithm, although it functions very well as a big 
checksum.  It is now feasible (2004) to produce two messages 
having the same MD5 message digest (``collision'' attack), 
and attacks of this nature are getting better and faster. 
It is still conjectured to be computationally infeasible 
(2007) to produce any message having a given prespecified 
target message digest (``preimage'' attack).
==============



It's worth checking carefully ... discussing the minutiae of 
cryptographic algorithms is like angels dancing on a pin.

iang


More information about the freebsd-security mailing list