Hi all,

Today, 30 December 2008, at the 25th Annual Chaos Communication Congress in 
Berlin,
we announced that we are currently in possession of a rogue Certification
Authority certificate. This certificate will be accepted as valid and trusted 
by 
all common browsers, because it appears to be signed by one of the commercial 
root 
CAs that browsers trust by default. We were able to do so by constructing a 
collision for the MD5 hash function, obtaining a valid CA signature in a 
website 
certificate legitimately purchased from the commercial CA, and copying this 
signature into a CA certificate constructed by us such that the signature 
remains 
valid. 

For more information about this project, see 
http://www.win.tue.nl/hashclash/rogue-ca/.

The team consists of: 

Alexander Sotirov (independent security researcher, New York, USA), 
Marc Stevens (CWI, Amsterdam, NL), 
Jacob Appelbaum (Noisebridge, The Tor Project, San Francisco, USA), 
Arjen Lenstra (EPFL, Lausanne, CH), 
David Molnar(UCB, Berkeley, USA), 
Dag Arne Osvik (EPFL, Lausanne, CH), 
Benne de Weger (TU/e, Eindhoven, NL).

For press and general inquiries, please email md5-collisi...@phreedom.org.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to