MD5 Message Digest Algorithm Hash Collision Weakness

An example exploit that demonstrates a possibility of creating multiple differing files with the same MD5 fingerprint has been provided by Dan Kaminsky <dan@doxpara.com>:


 

Privacy Statement
Copyright 2010, SecurityFocus