On Tue, 2011-06-28 at 16:19 -0400, Johannes B. Ullrich wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: RIPEMD160
> 
> couple links to articles I wrote about some of the issues. 
>
> https://isc.sans.edu/diary.html?storyid=11110

Its funny you mention md5 being old and the sha algorithms. I was just
reading the other day about how md5 is not secure at all[1]. Which was
some what shocking given how many distros and projects used md5 hash
value to verify that a file has not been modified.

CERT published information on md5 vulnerabilities back in 2008[2], and
recommends it not be used anymore. But flaws in md5 date back to
1998[1]. Which makes no sense why so many things use and rely on md5
hashes. SHA-1 should have been used instead, but that has since also
been proven vulnerable back in 2005[3]. Leaving only SHA-2 family and
the currently in development SHA-3[4].

Thus the only secure hash at this time is SHA-2 family, till SHA-3 is
finished being developed and released.

     1. http://en.wikipedia.org/wiki/MD5
     2. http://www.kb.cert.org/vuls/id/836068
     3. http://en.wikipedia.org/wiki/SHA-1
     4. http://en.wikipedia.org/wiki/SHA-2

-- 
William L. Thomson Jr.
Obsidian-Studios, Inc.
http://www.obsidian-studios.com


---------------------------------------------------------------------
Archive      http://marc.info/?l=jaxlug-list&r=1&w=2
RSS Feed     http://www.mail-archive.com/[email protected]/maillist.xml
Unsubscribe  [email protected]

Reply via email to