-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

freenetwork at web.de wrote:
> Hash function SHA-1 in distress

As worrying as this is, I don't think it affects Freenet yet. The attack
undermines the collision-resistance of the hash function, but as far as
I know Freenet only makes use of second-preimage-resistance.

Collision-resistance means it's hard to find two messages x and y such
that h(x) == h(y), whereas second-preimage-resistance means that given a
message x or a hash h(x), it's hard to find a second message y such that
h(x) == h(y). The difference is that in the first case the attacker can
manipulate both messages until the hashes match, which is how this
attack seems to work, whereas in the second case the attacker can only
manipulate one of the messages.

If collision-resistance is broken, an attacker can:

* Generate two different CHK blocks with the same key
* Generate two different SSK keypairs with the same hash
* Generate two different KSK names with the same keypair

As far as I can tell, none of these attacks would allow the attacker to
delete or modify existing data... can anyone think of any others?

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE8YbDyua14OQlJ3sRAjgYAKCsBVHtRyMRtlUnIw3w+Xgp1Ke0VwCgrE66
3iNSTHEEiG8SbpB7Mmw1i9k=
=xuRd
-----END PGP SIGNATURE-----

Reply via email to