| 
	
 | 
 Posted by Andy Hassall on 09/04/05 22:23 
On 4 Sep 2005 09:43:57 -0700, "R. Rajesh Jeba Anbiah" 
<ng4rrjanbiah@rediffmail.com> wrote: 
 
>Andy Hassall wrote: 
>>  This breaks MD5's use in verifying the contents/integrity of a file by 
>> checking the data's MD5 hash (since you can now modify the contents and tweak 
>> it to produce the same MD5 hash), but unless I'm missing something it doesn't 
>> affect the usage in passwords; it doesn't help in deriving from scratch a 
>> plaintext that produces a given MD5 hash? 
> 
>    Collision of hashes help brute force attacks. For example, if the 
>string of length 100's hash collides with string of length 10's hash, 
>it makes the cracking easy. 
 
 But how does that make it any easier to find from scratch a plaintext that 
produces a given MD5? The fact that there exist collisions in MD5 is obvious 
due to the pigeonhole principle, but it doesn't cut down your search space in 
any meaningful or predictable way? 
 
 Surely a different class of weakness is required to affect MD5's usage in 
passwords, i.e. some property of the MD5 hash value allowing deduction of some 
property of the possible plaintext values that could have produced it, reducing 
the brute force search space - AFAIK no such weakness has yet been found. 
 
 The fact that most user's passwords are probably 5-7 characters, consisting of 
characters [A-Za-z0-9], means brute forcing the search space is not beyond the 
realms of possibility with enough storage is still an issue, but it's not a new 
one, and is partially addressed by salting. 
 
-- 
Andy Hassall :: andy@andyh.co.uk :: http://www.andyh.co.uk 
http://www.andyhsoftware.co.uk/space :: disk and FTP usage analysis tool
 
  
Navigation:
[Reply to this message] 
 |