Bonsoir,

Hodie pr. Id. Mar. MMV est, Alicia da Conceicao scripsit:
> Of course, having a method in 2^69 calculations that find a second message
> that has the same SHA1 hash as a first message does not mean that the second
> message would be of any use to an attacker/forger.

This is not the result of the chinese team. What they did is enhance
the birthday paradox, from 2^80 to 2^69. But you have to generate 2^69
random messages, and you then have 50% chances that 2 of them have the
same hash. This is completely different that what you're saying:
finding a message that has the same hash as a choosed message.

-- 
Erwann ABALEA <[EMAIL PROTECTED]>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to