[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
bin/44160: outdated claim of cryptographic strength in md5(1) man page
>Synopsis: outdated claim of cryptographic strength in md5(1) man page
>Arrival-Date: Sat Nov 27 03:45:00 +0000 2010
>Originator: Taylor R Campbell <campbell+netbsd%mumble.net@localhost>
>Release: NetBSD 5.1_STABLE
The md5(1) man page claims of MD5 message digests that
`It is conjectured that it is computationally
infeasible to produc[e] two messages having the same
message digest, or to produce any message having a
given prespecified target message digest.'
This has not been true for many years. In particular, not only
have collisions been found, but they are so easy to find that
they have been used successfully to forge x.509 certificates
from commercial certification authorities; see
Type `man md5'.
Replace the security conjecture by an exhortation NOT to rely
on the collision-resistance of MD5. There are also theoretical
attacks on its preimage-resistance.
Main Index |
Thread Index |