SHA-1 Collisions for Meaningful Messages 128
mrogers writes "Following on the heels of last year's collision search attack against SHA-1, researchers at the Crypto 2006 conference have announced a new attack that allows the attacker to choose part of the colliding messages. "Using the new method, it is possible, for example, to produce two HTML documents with a long nonsense part after the closing </html> tag, which, despite slight differences in the HTML part, thanks to the adapted appendage have the same hash value." A similar attack against MD5 was announced last year."
yeah... nonsense (Score:5, Funny)
To achieve this, the method uses material pulled from myspace.com.
Re:yeah... nonsense (Score:2, Funny)
Falling back to sco.com, Microsoft.com, digg and slashdot, in that order.