Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
ryan-c
10y ago
0 comments
Share
What you describe there would be a preimage attack[0], not a collision attack. There is no publicly known practical[1] preimage attack on MD5 at this time.
0.
http://en.wikipedia.org/wiki/Preimage_attack
1. 2^123.4 complexity is
not
practical
0 comments
default
newest
oldest
taumhn
10y ago
If I understand correctly, what's described in the article indeed uses a collision attack. The "trusted app" is one the hacker manufactures himself.
ryan-c
OP
10y ago
Yes, that was what the article says, but the person I was responding to misunderstood.
j
/
k
navigate · click thread line to collapse