From: Eric Rannaud <eric.rannaud@ens.fr>
To: Andy Isaacson <adi@hexapodia.org>
Cc: Pedro Larroy <piotr@larroy.com>, linux-kernel@vger.kernel.org
Subject: Re: Call to atention about using hash functions as content indexers (SCM saga)
Date: Thu, 14 Apr 2005 08:35:07 -0500 [thread overview]
Message-ID: <1113485708.5744.22.camel@localhost> (raw)
In-Reply-To: <20050414083018.GA24892@hexapodia.org>
On Thu, 2005-04-14 at 01:30 -0700, Andy Isaacson wrote:
> In particular, your defense here is specious. I agree that second
> preimage is an unmanagably large problem for SHA1 for the forseeable
> future (say, 8 years out), but collision results almost always result in
> partially-controlled attack text. So I can choose my nefarious content,
> and encode the collision entropy in non-operative text (a C comment, for
> example).
Everything you said is fair enough, and I do agree with this argument in
the context of authentication: that is if you expect an attack (even if
a chunk of non-operative bytes won't go unnoticed for long in a the
kernel tree, but that's not the point).
But the original post of Pedro was, I think, about collisions occurring
'randomly' between two genuine modifications of a source file. In
particular, the paper that was linked to by Pedro is concerned with this
kind of unexpected collisions, i.e. about integrity in normal operation
and not about security (btw, this paper seems kind of bogus to me
because it never specifies the hash function in use).
I took the example of this attack against SHA-1 only to illustrate that
*even* if you try to find a collision, you just can't find one (at least
these days).
>From which I think it is fair to say that such a collision won't happen
between two different versions of the same file, during the normal
process of revision.
I mean, if in the normal revision process of the kernel, a SHA-1
collision was to be found, by chance, who gets to publish the paper at
the next Crypto conference?
However, if we consider the case of an attack, well, that's different.
And you're right.
/er.
--
http://www.eleves.ens.fr/home/rannaud/
prev parent reply other threads:[~2005-04-14 13:35 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-04-11 22:40 Call to atention about using hash functions as content indexers (SCM saga) Pedro Larroy
2005-04-11 22:51 ` Petr Baudis
2005-04-11 23:23 ` Magnus Damm
2005-04-12 10:02 ` Catalin Marinas
2005-04-12 9:59 ` Barry K. Nathan
2005-04-12 12:10 ` Richard B. Johnson
2005-04-12 15:29 ` Theodore Ts'o
2005-04-14 15:54 ` Eric D. Mudama
2005-04-12 16:35 ` Eric Rannaud
2005-04-14 8:30 ` Andy Isaacson
2005-04-14 13:35 ` Eric Rannaud [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1113485708.5744.22.camel@localhost \
--to=eric.rannaud@ens.fr \
--cc=adi@hexapodia.org \
--cc=linux-kernel@vger.kernel.org \
--cc=piotr@larroy.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox