[Cascavel-pm] vulnerabilidade no algorítmo do MD5 (e outros)

Alceu R. de Freitas Jr. glasswalk3r em yahoo.com.br
Quinta Dezembro 2 05:43:00 CST 2004


"MD5's flaws that have been identified in the past few
days mean that an attacker can generate one hash
collision in a few hours on a standard PC. To write a
specific back door and cloak it with the same hash
collision may be much more time intensive.

Still, Hughes said that programmers should start
moving away from MD5. "Right now the algorithm has
been shown to be weak," he said. "Before useful
(attacks) can be done, it's time to migrate away from
it." "

Mais informações:
http://news.com.com/Crypto+researchers+abuzz+over+flaws/2100-1002_3-5313655.html


[]´s


=====
Alceu Rodrigues de Freitas Junior
--------------------------------------
glasswalk3r em yahoo.com.br
http://www.imortais.cjb.net
-----------------------------------------------------------------------
A well-used door needs no oil on its hinges.
A swift-flowing stream does not grow stagnant.
Neither sound nor thoughts can travel through a vacuum.
Software rots if not used.
These are great mysteries -- The Tao Of Programming, 5.1


	
	
		
_______________________________________________________ 
Yahoo! Acesso Grátis - Internet rápida e grátis. Instale o discador agora! http://br.acesso.yahoo.com/


Mais detalhes sobre a lista de discussão Cascavel-pm