Bernard Dautrevaux <[EMAIL PROTECTED]> writes:
> It's even worst than that: Alice can agree with Bob to the original
> contract, and have Bob sign it. THEN she have:
>    - The contract itself (which can be used to generate the MD5 digest)
>    - Bob's signed MD5 digest
> 
> Then applying the birthday attack she can fiddle with the "better-for-her"
> contract till it generates the same MD5 digest. The mere fact the MD5 digest
> is the same makes that Bob's signature "match" this contract.
You misunderstand the birthday attack, which involves creating
two messages which have the same (previously unknown) digest.
The birthday attack requires you to create the message pair
upfront, before the signature occurs.

The attack you describe: creating a document with a SPECIFIC digest,
is 2^n hard (where n is the length of the hash). (Assuming, of course,
that no attack better than brute force is known for the digest
in question).

-Ekr

-- 
[Eric Rescorla                                   [EMAIL PROTECTED]]
                http://www.rtfm.com/
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to