Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl: the Markov chain saw
 
PerlMonks  

Re^3: On showing the weakness in the MD5 digest function and getting bitten by scalar context

by hardburn (Abbot)
on Aug 30, 2004 at 12:52 UTC ( #386903=note: print w/ replies, xml ) Need Help??


in reply to Re^2: On showing the weakness in the MD5 digest function and getting bitten by scalar context
in thread On showing the weakness in the MD5 digest function and getting bitten by scalar context

shouldn't a longer output translate directly to more work? Are you suggesting that there is a better-than-brute-force attack against SHA-512?

I wasn't sure, but as I recalled, SHA-512 is useful when you need 512 bits of information, but for something other than security reasons. It'd be no more secure than if you had taken the orginal data, hashed it, flipped a bit in the hash, hashed that, and the concatonted the two hashes together into a value twice the size of orginal hash. It's bigger, but you could still cryptoanaylize the hash with as much work as it would take to get the orginal hash size.

However, a lot of other things I've read seem to contrict what I thought I knew; SHA-512 might really be that much more secure, at least as far as brute-forcing goes.

"There is no shame in being self-taught, only in not trying to learn in the first place." -- Atrus, Myst: The Book of D'ni.


Comment on Re^3: On showing the weakness in the MD5 digest function and getting bitten by scalar context

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://386903]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others chanting in the Monastery: (10)
As of 2014-08-20 20:51 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    The best computer themed movie is:











    Results (124 votes), past polls