Questions about generating keys (hash firewalls)

Oskar L. oskar at rbgi.net
Sat Aug 25 04:11:44 CEST 2007


> Well, except that your attack isn't a birthday attack.
>
> A birthday attack involves making a ton of different messages and
> checking _all_ messages created to find _any_ collision.
>
> Your attack involves taking one particular message and creating
> permutations of it, one after another, looking for a collision with your
> particular message.

No, in my example I used two, not one messages (pictures) and created
permutations of both, and then compared both groups of hashes against each
other.

Oskar






More information about the Gnupg-users mailing list