[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e024ccca0703240724k4dad87e4r5da2a8339013d842@mail.gmail.com>
Date: Sat, 24 Mar 2007 10:24:26 -0400
From: "Dude VanWinkle" <dudevanwinkle@...il.com>
To: michaelslists@...il.com
Cc: full-disclosure@...ts.grok.org.uk, "Dave No,
not that one Korn" <davek_throwaway@...mail.com>
Subject: Re: Chinese Professor Cracks Fifth Data
SecurityAlgorithm (SHA-1)
On 3/23/07, Michael Silk <michaelslists@...il.com> wrote:
> On 3/23/07, Dave No, not that one Korn <davek_throwaway@...mail.com> wrote:
> > Tim wrote:
> > > Hello,
> > >
> > > On Wed, Mar 21, 2007 at 06:45:19PM +0300, 3APA3A wrote:
> > >> Dear Michael Silk,
> > >>
> > >> First, by reading 'crack' I thought lady can recover full
> > >> message by it's signature. After careful reading she can bruteforce
> > >> collisions 2000 times faster.
> > >
> > > Both of you guys are confused.
> > >
> > > First off Michael: this is old news. It doesn't seem to indicate that
> > > finding collisions is any faster than 2^63, which was reported quite
> > > some time ago[1].
> >
> > It's not just old news, but old old news, since we already had this
> > discussion about how it was old news back in january when the piece was
> > published...
>
>
> yes yes yes. i have a bad memory. i don't read articles before posting them.
> anyone else want to take a shot?
OK.. your parents have a questionable heritage.
there, take that buddy!
-JP
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists