Windows .PWL cracker implemented as a Word Basic virus
David A Wagner
daw at quito.CS.Berkeley.EDU
Sun Dec 10 15:22:56 PST 1995
-----BEGIN PGP SIGNED MESSAGE-----
In article <95Dec10.175318edt.1732 at cannon.ecf.toronto.edu>,
SINCLAIR DOUGLAS N <sinclai at ecf.toronto.edu> wrote:
> My understanding was that MD4 had been broken once, at the cost of
> much computer time.
Not *that* much computer time...
In my copy of Hans Dobbertin's paper, the abstract says
``An implementation of our
attack allows to find collisions for MD4 in less than a minute on a PC.''
As far as I know, the difficulty of inverting MD4 is still an open
problem -- but why would you want to use a broken algorithm like MD4
when you can use MD2, MD5, or SHA?
- ---
[This message has been signed by an auto-signing service. A valid signature
means only that it has been received at the address corresponding to the
signature and forwarded.]
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Gratis auto-signing service
iQBFAwUBMMtrRCoZzwIn1bdtAQGQwQF+JlWjDgMCs+Y6nO/tUzrXcd9wJCrTLHx2
NlC+1bHspTvJSXSD29M73rfeyOfWOTtQ
=4jl6
-----END PGP SIGNATURE-----
More information about the cypherpunks-legacy
mailing list