Date: Mon, 12 May 2003 10:41:09 +0200 From: "Poul-Henning Kamp" <phk@phk.freebsd.dk> To: netch@netch.kiev.ua Cc: bugs@freebsd.org Subject: Re: /dev/random and /dev/urandom Message-ID: <7680.1052728869@critter.freebsd.dk> In-Reply-To: Your message of "Mon, 12 May 2003 11:38:07 %2B0300." <20030512083807.GL73391@netch.kiev.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <20030512083807.GL73391@netch.kiev.ua>, Valentin Nechayev writes: > Sun, May 11, 2003 at 23:29:32, phk wrote about "Re: /dev/random and /dev/urandom": > >> There is one current concern with MD5: over-ratio of collisions. >> >> What this means is that it may be a bit too easy to find a >> MD5 input which generates a given MD5 output. > >Sorry, I might forget cryptography news for a few last years. >Do you say there is _real_ example of two different data streams producing >identical MD5 output _of its full length_? >Please show an URL if things are already on this way... No, but research has shown that this _may_ not be as hard to accomplish as previously expected. Appearantly this has got a lot of people jumping up and down, pointing fingers at MD5, which IMO is an overreaction. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7680.1052728869>