Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
ryan-c
on June 10, 2015
|
parent
|
context
|
favorite
| on:
Poisonous MD5 – Wolves Among the Sheep
What you describe there would be a preimage attack[0], not a collision attack. There is no publicly known practical[1] preimage attack on MD5 at this time.
0.
http://en.wikipedia.org/wiki/Preimage_attack
1. 2^123.4 complexity is
not
practical
taumhn
on June 10, 2015
[–]
If I understand correctly, what's described in the article indeed uses a collision attack. The "trusted app" is one the hacker manufactures himself.
ryan-c
on June 11, 2015
|
parent
[–]
Yes, that was what the article says, but the person I was responding to misunderstood.
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
0. http://en.wikipedia.org/wiki/Preimage_attack
1. 2^123.4 complexity is not practical