|
Something to consider if you're going to depend on MD5 for a unique key. In crypto analysis, these duplicates (or collisions) can be exploited in what's known as a "birthday" attack As the article points out, SHA1 is a better hashing algorithm. It does however generate a larger hash (160 bits vs 128). This just underscores Scott's point about using know routines. The best ones have withstood the scrutiny of experts. MD5 is still a popular hash for file check summing. The likely hood of a file error generating the same hash is extremely unlikely. Keith Tony Carolla wrote: > Even with MD5, there are possibilities of different input values > generating the same key. I was just reading an article the other day > that demonstrates this weakness. I am not sure if I can send out > links on this list, but if I can, the link is here: > > http://www.doxpara.com/md5_someday.pdf
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.