More Hash Function Attacks
Here’s a pair of valid X.509 certificates that have identical signatures. The hash function used is MD5.
And here’s a paper demonstrating a technique for finding MD5 collisions quickly: eight hours on 1.6 GHz computer.
Posted on March 10, 2005 at 1:19 PM •
Sidebar photo of Bruce Schneier by Joe MacInnis.