Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

That's like saying "There are no known attacks against MD5 as long as you don't try to attack it"


Usecase where this property is useful:

Developer writes some code and publishes it. It's big, so he puts it on an untrusted CDN, and also publishes an MD5 hash of the code (not via the CDN).

User downloads the code from the CDN, and verifies the published hash matches.

A malicious CDN couldn't make an evil file with a matching hash, based on known attacks against MD5, unless they could influence the Developer to get certain data into the original file.


"malicious CDN couldn't make an evil file"

Then the CDN, by definition, would control the data that the end-user (downloader) hashes.

But I understand the confusion: londons_explore meant to write "there are no known (practical) preimage attacks" against MD5, which is true, since the only theoretical preimage has a complexity 2^123 or so.


Not really. This actually provides useful properties in practice, though you should still probably not rely on that.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: