Questions about generating keys (hash firewalls)
Oskar L.
oskar at rbgi.net
Sat Aug 25 04:11:44 CEST 2007
> Well, except that your attack isn't a birthday attack.
>
> A birthday attack involves making a ton of different messages and
> checking _all_ messages created to find _any_ collision.
>
> Your attack involves taking one particular message and creating
> permutations of it, one after another, looking for a collision with your
> particular message.
No, in my example I used two, not one messages (pictures) and created
permutations of both, and then compared both groups of hashes against each
other.
Oskar
More information about the Gnupg-users
mailing list