LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 09-23-2010, 08:39 AM   #1
peter1234
Member
 
Registered: Apr 2009
Posts: 42

Rep: Reputation: 2
Md5 spoof - Proof of concept with sample files!


Hi All,

I been hearing about md5 spoof for some time, and did a search on it and came across this site.

http://www.win.tue.nl/hashclash/SoftIntCodeSign/

I downloaded the two files (they were identical size) and ran md5 and it was the same! Just to make sure I ran sha1, 256 also and shasums were different.

Hope this was informative.
 
Old 09-23-2010, 09:27 AM   #2
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
One of the links on there also points out that there exist collisions for sha1 as well.
 
Old 09-23-2010, 09:30 AM   #3
Jeebizz
Senior Member
 
Registered: May 2004
Distribution: Slackware15.0 64-Bit Desktop, Debian 11 non-free Toshiba Satellite Notebook
Posts: 4,180

Rep: Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377
What surprises me is that the OP is surprised. There is no such thing as a 100% secure checksum/crypto system. Whats important now anyways is that the developers of said tools have already caught wind of this and are working on the fix.
 
Old 09-23-2010, 10:16 AM   #4
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,897

Rep: Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018Reputation: 5018
Quote:
It is important to note that the hash value shared by the two different files is a result of the collision construction process. We cannot target a given hash value, and produce a (meaningful) input bit string hashing to that given value.
Though interesting from a theoretical crypto standpoint, it doesn't look to be any threat to md5sums as used for verifying a downloaded file hasn't been tampered with. They need to modify both files before they can engineer a collision. If they could achieve a collision by only modifying one of the files, then that would be a far more worrying.

Still, it was an interesting read. Thanks for posting.
 
Old 09-24-2010, 07:12 AM   #5
MTK358
LQ 5k Club
 
Registered: Sep 2009
Posts: 6,443
Blog Entries: 3

Rep: Reputation: 723Reputation: 723Reputation: 723Reputation: 723Reputation: 723Reputation: 723Reputation: 723
If you have a file with 1000 bytes, and there's 8 bits in each byte, there could be 2^8000 (so much that my calculator app fails) different combinations.

And md5 sum consists of 128 bits, and has 2^128 (340282366920938463463374607431768211456) different possibilities. Not even close to the 1KB file.

Last edited by MTK358; 09-24-2010 at 07:13 AM.
 
Old 09-24-2010, 08:15 AM   #6
Alexvader
Member
 
Registered: Oct 2009
Location: Japan
Distribution: Arch, Debian, Slackware
Posts: 994

Rep: Reputation: 94
Hi...

The MD ( message Digest ) family of Hash functions has been proved to be weak ( theoretically speaking ) to cryptanalitic attacks;

Several papers pertaining to its weakness have been published by RSA, and by Bruce Schneier himself...

The weaknesses are deemed theoretical because, despite the fact that one does not need a brute force attack to find a collision, several properties of the algorithm of hash

can be exploited to find a collision, this requires nonetheless a huge ammount of processing...
 
Old 09-24-2010, 07:14 PM   #7
lupusarcanus
Senior Member
 
Registered: Mar 2009
Location: USA
Distribution: Arch
Posts: 1,022
Blog Entries: 19

Rep: Reputation: 146Reputation: 146
Quote:
Originally Posted by Jeebizz View Post
What surprises me is that the OP is surprised. There is no such thing as a 100% secure checksum/crypto system. Whats important now anyways is that the developers of said tools have already caught wind of this and are working on the fix.
What surprises me is that you are surprised that the OP is surprised.
 
Old 09-25-2010, 05:15 AM   #8
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
Quote:
Originally Posted by leopard View Post
What surprises me is that you are surprised that the OP is surprised.
What doesn't surprise me is what surprises you that you were surprised that the OP was surprised about being surprised about that.
 
Old 09-25-2010, 05:48 AM   #9
lupusarcanus
Senior Member
 
Registered: Mar 2009
Location: USA
Distribution: Arch
Posts: 1,022
Blog Entries: 19

Rep: Reputation: 146Reputation: 146
Quote:
Originally Posted by H_TeXMeX_H View Post
What doesn't surprise me is what surprises you that you were surprised that the OP was surprised about being surprised about that.
What halfheartedly surprises me is that you aren't surprised that I was surprised that I was surprised that the OP was surprised about being surprised about that.

Surprising, isn't it?
 
Old 09-25-2010, 06:58 AM   #10
MTK358
LQ 5k Club
 
Registered: Sep 2009
Posts: 6,443
Blog Entries: 3

Rep: Reputation: 723Reputation: 723Reputation: 723Reputation: 723Reputation: 723Reputation: 723Reputation: 723
Quote:
Originally Posted by leopard View Post
What surprises me is that you are surprised that the OP is surprised.
I'm surprised that you're not surprised by the OP being surprised.
 
Old 09-25-2010, 07:39 AM   #11
Alexvader
Member
 
Registered: Oct 2009
Location: Japan
Distribution: Arch, Debian, Slackware
Posts: 994

Rep: Reputation: 94
Quote:
Originally Posted by leopard View Post
What halfheartedly surprises me is that you aren't surprised that I was surprised that I was surprised that the OP was surprised about being surprised about that.

Surprising, isn't it?

What halfheartedly surprises me is that you aren't surprised POW( that I was surprised , N ) that the OP was surprised about being surprised about that
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
sample example of how to read files amit_pansuria Programming 2 05-29-2007 10:30 AM
MAC spoof concept zillah Linux - Security 6 04-11-2007 08:40 AM
New Cross-Platform Virus Proof of Concept win32sux Linux - Security 19 04-18-2006 11:24 PM
LXer: Virus proof of concept can infect both Windows and Linux systems LXer Syndicated Linux News 0 04-08-2006 04:21 PM
LDAP + Proof Of Concept damicatz Linux - Networking 5 11-27-2004 04:50 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 07:59 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration