On Mon, 14 Mar 2005, Ferdinand Prantl wrote:
Hi,
you may want to read yet another paper, where a different,
faster method is introduced, than the chinese one (english):
http://cryptography.hyperlink.cz/md5/MD5_collisions.pdf
Careful. This is with MD5, a different (but still related) algorithm tha
Of Erwann ABALEA
> Sent: Monday, March 14, 2005 6:27 PM
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Re: The breaking of SHA1
>
> Bonsoir,
>
> Hodie pr. Id. Mar. MMV est, Alicia da Conceicao scripsit:
> > Of course, having a method in 2^69 calculations that
Bonsoir,
Hodie pr. Id. Mar. MMV est, Alicia da Conceicao scripsit:
> Of course, having a method in 2^69 calculations that find a second message
> that has the same SHA1 hash as a first message does not mean that the second
> message would be of any use to an attacker/forger.
This is not the resul