On Thu, 23 Dec 2010 19:31:23 +0100
mouss <mo...@ml.netoyen.net> wrote:

> if you're worried about performace, don't hash at all. would you use a
> cesar/base64/... ? either you need security and you use an algorithm
> that's not considered broken, or you don't.

The breaks in md5 would allow an attacker to generate a second email
address that collides with a given address. I don't see how that
compromises anything since presumably the intent is to avoid an
attacker inferring an address from a hash.

From the security point of view the scheme itself is far more broken
than md5 is. A secure hash function can only protect addresses that
are both secret and contain a cryptographically secure amount of
entropy.

I'm curious as to the point of this. Phishing/fraud  contact addresses
might be better left to AV software that already have the
infrastructure to push this kind of information without any
side-channel leakage. Abusive marketers use fixed from addresses
but their status is often subjective.  If the intent is to catch lazy
spammers, I think it'll be a very short-term win.

Reply via email to