Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 12 May 2003 10:41:09 +0200
From:      "Poul-Henning Kamp" <phk@phk.freebsd.dk>
To:        netch@netch.kiev.ua
Cc:        bugs@freebsd.org
Subject:   Re: /dev/random and /dev/urandom 
Message-ID:  <7680.1052728869@critter.freebsd.dk>
In-Reply-To: Your message of "Mon, 12 May 2003 11:38:07 %2B0300." <20030512083807.GL73391@netch.kiev.ua> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <20030512083807.GL73391@netch.kiev.ua>, Valentin Nechayev writes:
> Sun, May 11, 2003 at 23:29:32, phk wrote about "Re: /dev/random and /dev/urandom": 
>
>> There is one current concern with MD5: over-ratio of collisions.
>> 
>> What this means is that it may be a bit too easy to find a
>> MD5 input which generates a given MD5 output.
>
>Sorry, I might forget cryptography news for a few last years.
>Do you say there is _real_ example of two different data streams producing
>identical MD5 output _of its full length_?
>Please show an URL if things are already on this way...

No, but research has shown that this _may_ not be as hard to
accomplish as previously expected.

Appearantly this has got a lot of people jumping up and down,
pointing fingers at MD5, which IMO is an overreaction.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7680.1052728869>