* [EMAIL PROTECTED] wrote:
Of course, it is a trick. Yesterday I updated my paper Tunnels in
Hash Functions: MD5 Collisions Within a Minute
(http://eprint.iacr.org/2006/105.pdf) and MD5 collision program
(http://cryptography.hyperlink.cz/2006/web_version_1.zip).
just being curious: from what
Hi Vlastimil and group,
Gera Richarte has done some interesting work with executable files that
have the same MD5 hash. Take a look at
http://www.coresecurity.com/corelabs/projects/research_topics.php
to see his talk at PacSec `05 and Two executable files with the same
MD5 hash, crc32, checksum32
The trick could be shortly expressed as follows:
Give me three files and I will give you another three with the
same MD5 hash
Of course, it is a trick. Yesterday I updated my paper
Tunnels in Hash Functions: MD5 Collisions Within a Minute
(http://eprint.iacr.org/2006/105.pdf)
and MD5 collision