Questions about generating keys (hash firewalls)

Oskar L. oskar at
Sat Aug 25 04:11:44 CEST 2007

> Well, except that your attack isn't a birthday attack.
> A birthday attack involves making a ton of different messages and
> checking _all_ messages created to find _any_ collision.
> Your attack involves taking one particular message and creating
> permutations of it, one after another, looking for a collision with your
> particular message.

No, in my example I used two, not one messages (pictures) and created
permutations of both, and then compared both groups of hashes against each


More information about the Gnupg-users mailing list