[3858] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: MD5

daemon@ATHENA.MIT.EDU (Eric Murray)
Sat Dec 26 13:29:18 1998

Date: Sat, 26 Dec 1998 10:16:36 -0800
From: Eric Murray <ericm@lne.com>
To: Ben Laurie <ben@algroup.co.uk>
Cc: Eric Murray <ericm@lne.com>, Andrew Maslar <amaslar@home.com>,
        Cryptography List <cryptography@c2.net>
In-Reply-To: <36851EA9.8DE5CAE@algroup.co.uk>; from Ben Laurie on Sat, Dec 26, 1998 at 05:36:42PM +0000

On Sat, Dec 26, 1998 at 05:36:42PM +0000, Ben Laurie wrote:
> Eric Murray wrote:
> > 
> > On Fri, Dec 25, 1998 at 11:37:03AM -0500, Andrew Maslar wrote:
> > > Hello all.
> > >
> > > I'm new to the list; hope I can be helpful some day.
> > > But first a question:
> > >
> > > I'm toying around with various protocols for key exchange, and I wonder,
> > > if an attacker intercepted the result of the following operation:
> > >
> > > md5(x) + md5(x + y + z)
> > >
> > > (the +'s mean concatenation)
> > >
> > > and the attacker already knew:
> > >
> > > 1. the nature of the operation
> > > 2. x
> > > 3. z
> > >
> > > Could s/he compute y?
> > 
> > You really want to ask "how hard would be for an attacker
> > to compute y?".    It's always possible, it's just a question
> > of being practical (or more properly, cost-effective for
> > the attacker).
> 
> Surely in the case of MD5 (or any other hash) the question is "how hard
> would it be for an attacker to compute a value that gives the same
> result as y?". Of course, y is one candidate, but generally there are an
> infinity of them, right?


Right.

The way I read Andrew's question, y is a secret to be used in the
key exchange.   So, while it's easier to compute,  a y' which isn't y
but produces the same hash as y would not result in a listener
being able to discover the secret.

However, generating a hash collision might allow another attack, such
as MITM.

-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5


home help back first fref pref prev next nref lref last post