Tags Math

The "Apple on x86" drunk online community pays little attention to this, but following a few brilliant results that show how to find collisions in MD5, two german researchers actually created meaningful collisions!! - two .ps docs with different content (one benign, one malicious) that hash into the same MD5 sum.

This method is generally applicable against SHA-1 as well, and takes only a few hours on a PC (though it will take more with SHA-1). Now think of some goverment agency that has hackers that can optimize the collision-finding code, and a lot of powerful machines - this is the death warrant of MD5 (one of the most widely used hash signatures in the world !).

So people may continue oh-ing and ah-ing on Apple and x86 - but this is far bigger !!