Re: [librsync-users] MD4 second-preimage attack

2006-03-04 Thread rsync2eran
Hi, On 2006-03-01 18:29, Donovan Baarda wrote: > http://sourceforge.net/mailarchive/forum.php?forum_id=29760&max_rows=25&style=flat&viewmonth=200404&viewday=5 > > If I understand correctly, provided we add random seeds for blocksums, > these weaknesses would only make attack case 4) easier. It i

Re: [librsync-users] MD4 second-preimage attack

2006-03-01 Thread Donovan Baarda
On Tue, 2006-02-21 at 14:58 -0800, [EMAIL PROTECTED] wrote: > Hi, > > A year ago we discussed the strength of the MD4 hash used by rsync and > librsync, and one of the points mentioned was that only collision > attacks are known on MD4. Well, a recent paper by Wang et al [1] shows a > several seco

Re: MD4 second-preimage attack

2006-02-21 Thread rsync2eran
On 2006-02-21 16:09, Martin Pool wrote: > Could you please forward this into the bug tracker so it's not lost? Done: https://sourceforge.net/tracker/index.php?func=detail&aid=1436299&group_id=56125&atid=479439 https://sourceforge.net/tracker/index.php?func=detail&aid=1436301&group_id=56125&atid=4

Re: [librsync-users] MD4 second-preimage attack

2006-02-21 Thread Martin Pool
On Tue, 2006-02-21 at 14:58 -0800, [EMAIL PROTECTED] wrote: > A year ago we discussed the strength of the MD4 hash used by rsync and > librsync, and one of the points mentioned was that only collision > attacks are known on MD4. Could you please forward this into the bug tracker so it's not lost?