[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: rsync and md4



-----BEGIN PGP SIGNED MESSAGE-----

> On Sat, 29 Jun 1996, Andrew Tridgell wrote:
> 
> > Now I'd like to calculate some probabilities of failure of the
> > algorithm. The fundamental thing I need to know to do the calculation
> > is the probability of a random piece of data of length n having the
> > same md4 checksum as another given piece of data of the same length.
> 
> MD4 is a hashing algorithm, but it can be used for checksuming.
> >
> > A first guess might be 2^-128 but I know that this sort of thing is
> > rarely that simple. Is md4 that good?
> 
> 2^-64.

Are you sure?  MD5 is a 128 bit hash, and the probability of collision with 
a specific random piece of data (of any length) should be 2^-128.  I could 
be wrong, but do you have any explanation of why you think the answer is 
2^-64.

<snip>

> > Why md4? I chose md4 because it seemed to be the fastest of the
> > reputedly strong, publicly available checksum algorithms. Suggestions
> > for alternative algorithms are welcome.

MD4 is the fastest hash I am aware of.  However, there has been some 
successful attacks against two rounds of MD4.  Although this is not to 
suggest that MD4 is insecure, MD5 almost as fast (~1.3 times slower) and 
more secure.
David F. Ogren                | 
[email protected]          | "A man without religion is like a fish
PGP Key ID: 0xC626E311        |  without a bicycle"
- ------------------------------|----------------------------------------
Don't know what PGP is?       | Need my public key?  It's available
Send a message to me with the | by server or by sending me a message
subject GETPGPINFO            | with the subject GETPGPKEY
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMdXI1fBB6nnGJuMRAQFghwP/W0ZzdAYcbsdsCcrA97cwfw4uwug8sJWd
bjWD4Z+ski7kE4HN7bj2dRLFGke6EQZ8DiebnLIRPqGCxeyxdzotqcrsdKrgp+eN
eMfjp0Y3wVwvrPn2kVI5M0iI9kpX8tvvLh7Kp3OBvHdsBTim4aPPuM8xR2SHLSgv
/SYnhEBeYLA=
=VPWe
-----END PGP SIGNATURE-----