Connect with us

MD5 ALGORITHM

Discussion in 'Electronic Design' started by Andrew Wade, Aug 11, 2005.

Scroll to continue with content
  1. Andrew Wade

    Andrew Wade Guest

    I AM TRYING TO IMPLEMENT AN MD5 algorithm on a PIC 18F452.

    Any one done this for a pic before? 16 or 18 series.

    we use Proton pic basic and assembler.

    Andrew

     
  2. JeffM

    JeffM Guest

  3. Ben Bradley

    Ben Bradley Guest

    Looks like he's got "techniques" down (he got the task done, the
    message is on the groups he decided it should be on), he "just" needs
    to learn Netiquette. Unfortunately, it seems many posters read Emily
    Postnews and take what she writes literally.
     
  4. Andrew Wade

    Andrew Wade Guest

    Sorry chaps.

    And of course none of you have ever been struggling on a project with 3 days
    to go and desperately looking for help , some where , any where ............
    have you

    Thanks for your help I hope some young student just starting out in this
    game doesn't come across you first and get put off.


    Very Best Regards (sorry don't speak Klingon)
     
  5. Jim Backus

    Jim Backus Guest

  6. Wot a World

    Wot a World Guest

    The Chinese research, IIRC was for _selected_ fixed-length pairs of
    data blocks that generated identical MD5 hashes and this demonstrated
    that a collision is possible and could be found in a reasonable amount
    of time. They did _not_ prove that arbitrary data could be arbitrarily
    altered and yield the same MD5 hash.

    While it is possible, given a message and an MD5 hash, to find another
    message that has the same MD5 hash, it is still extremely difficult to
    come up with a message that suits the purpose of the attacker and
    still have the same hash. (i.e., change a speed readout without adding
    all kinds of other filler to alter the message and get it to hash to
    the same value)

    http://schneier.com/blog/archives/2005/02/cryptanalysis_o.html

    http://www.schneier.com/blog/archives/2005/08/the_md5_defense.html

    http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf (The Chinese
    method)

    http://cryptography.hyperlink.cz/md5/MD5_collisions.pdf
     
Ask a Question
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.
Electronics Point Logo
Continue to site
Quote of the day

-