Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Chinese Professor Cracks Fifth Data SecurityAlgorithm (SHA-1)
From: "Dave \"No, not that one\" Korn" <davek_throwaway () hotmail com>
Date: Thu, 22 Mar 2007 14:16:27 -0000

Tim wrote:

On Wed, Mar 21, 2007 at 06:45:19PM +0300, 3APA3A wrote:
Dear Michael Silk,

First,  by  reading  'crack'  I thought lady can recover full
message by it's signature. After careful reading she can bruteforce
collisions 2000 times faster.

Both of you guys are confused.

First off Michael: this is old news.  It doesn't seem to indicate that
finding collisions is any faster than 2^63, which was reported quite
some time ago[1].

  It's not just old news, but old old news, since we already had this 
discussion about how it was old news back in january when the piece was 

Can't think of a witty .sigline today.... 

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]