G+_Eddie Foy Posted June 8, 2015 Share Posted June 8, 2015 Interesting! http://tinyurl.com/oxajabk Link to comment Share on other sites More sharing options...
G+_Jeff Brand Posted June 8, 2015 Share Posted June 8, 2015 Well... I think it needs more analysis. 1. He implemented his own MD5. 2. He's replacing text with text, which doesn't quite demo his premise. 3. While I don't know too much about the flexibility of his technique, what are the chances that it yields a functioning binary? MD5 collisions are a thing. I don't think that he's quite demonstrated a "binary collision" in the meaning of "binary executable" where it would be most dangerous and interesting. Link to comment Share on other sites More sharing options...
G+_Jeff Brand Posted June 8, 2015 Share Posted June 8, 2015 Someone who actually did something useful with the technique: https://www.win.tue.nl/hashclash/TargetCollidingCertificates/ Link to comment Share on other sites More sharing options...
Recommended Posts