James A. Donald wrote:
    --
On 15 Dec 2004 at 8:51, Ben Laurie wrote:

People seem to be having a hard time grasping what I'm trying
to say, so perhaps I should phrase it as a challenge: find me
a scenario where you can use an MD5 collision to mount an
attack in which I could not mount an equally effective attack
without using an MD5 collision.


I could circulate watermarked versions of copyrighted material
without it being apparent that they were watermarked.

That was the attack I was not disputing :-)

--
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to