From owner-man-jp-reviewer@jp.FreeBSD.org Tue May  7 05:02:22 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id g46K2Ma66527;
	Tue, 7 May 2002 05:02:22 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from BUN.1YEN.CX (pl106.nas921.n-yokohama.nttpc.ne.jp [210.165.103.106])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id g46K2Hf66522
	for <man-jp-reviewer@jp.freebsd.org>; Tue, 7 May 2002 05:02:22 +0900 (JST)
	(envelope-from 1yen@manami.mine.nu)
Received: (from root@localhost)
	by BUN.1YEN.CX (8.12.3/8.12.3) id g46K2BYg070481
	for man-jp-reviewer@jp.freebsd.org; Tue, 7 May 2002 05:02:11 +0900 (JST)
	(envelope-from 1yen@BUN.1YEN.CX)
Received: from BUN.1YEN.CX (localhost [127.0.0.1])
	by BUN.1YEN.CX (8.12.3/8.12.3av) with ESMTP id g46K25tj070473
	for <man-jp-reviewer@jp.FreeBSD.org>; Tue, 7 May 2002 05:02:10 +0900 (JST)
	(envelope-from 1yen@BUN.1YEN.CX)
Message-Id: <200205062002.g46K25tj070473@BUN.1YEN.CX>
To: man-jp-reviewer@jp.FreeBSD.org
From: 1Yen@Bigfoot.COM
In-reply-to: Your message of "Tue, 07 May 2002 03:44:28 JST."
             <004401c1f52e$16d8eb20$0300a8c0@3W1G31S>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-2022-jp"
Content-ID: <70471.1020715325.1@BUN.1YEN.CX>
Content-Transfer-Encoding: 7bit
Date: Tue, 07 May 2002 05:02:05 +0900
X-Virus-Scanned: by AMaViS perl-11
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+020417
X-Sequence: man-jp-reviewer 4117
Subject: [man-jp-reviewer 4117] Re: From md5.3 R3.1 to R4.5
Errors-To: owner-man-jp-reviewer@jp.FreeBSD.org
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: 1yen@manami.mine.nu

$BCgB<$G$9!#(B
$B1Q8l$b8+$:$K!"Lu$5$l$?F|K\8l$+$iFI$_<h$C$F$$$^$9!#(B

>$B$=$3$G!"(Bmd5.1$B86J8$N!"(B
>MD5 has not yet (1999-02-11) been broken, but sufficient attacks have been
>made that its security is in some doubt.  The attacks on both MD4 and MD5
>are both in the nature of finding ``collisions'' \- that is, multiple
>inputs which hash to the same value; it is still unlikely for an attacker
>to be able to determine the exact original input given a hash value.
>$B$H$$$&$H$3$m$G$9$,!"(Bmd5.1$B$NLu$G$O$[$s$N>/$786J8$,0[$J$j$^$9$,<!$N$h$&$K$J$C$F$$$^$9!#(B
>
>     MD5 $B$O$^$@(B (2001-09-03) $BGK$i$l$F$$$^$;$s$,!"%;(B
>     $B%-%e%j%F%#$KBP$9$k$$$/$i$+$N5?$$$r$b$?$i$9==J,$J967b$,$J$5$l$F$$$^$9!#(B
>     MD5 $B$KBP$9$k967b$O!"(B ``$B>WFM(B'' $B$r8+$D$1$k$H$$$&<oN`$N$b$N$G$9(B -- $B$9$J$o(B
>     $B$A!"J#?t$NF~NO$,F1$8CM$K%O%C%7%e$5$l$k$H$$$&$b$N$G$9!#$7$+$7$J$,$i!"%O%C(B
>     $B%7%eCM$+$i85$NF~NO$r@53N$K7hDj$9$k$3$H$O!"$^$@967b<T$K$H$C$F2DG=$G$O$J$5(B
>     $B$=$&$G$9!#(B
>
>$B$3$3$J$s$G$9$,!"!H>WFM(B"$B$H$O2?$,>WFM$7$F$$$k$N$G$7$g$&$+(B?

 $B=c?h$K(B hash $B$NCM$,$V$D$+$k$3$H$r;X$7$F$$$k$N$G$7$g$&!#(B
file A $B$KBP$9$k(B md5 $B$NCM$H(B file B $B$KBP$9$k(B md5 $B$NCM$,(B $BF1$8$K$J$k$H$-!"(B
md5 $B$NCM$O!"(B file A $B$,(B file B ($B$^$?$O$=$N5U(B)$B$K2~cb$5$l$F$$$J$$;v$r>ZL@$G$-$J$/$J$k(B
 ==> $BEE;R=pL>$K;H$($J$$(B $B$C$F;v$G$O$J$$$G$7$g$&$+!#(B

``collisions''$B$H$$$&C18l$r@bL@$7$F$$$k$N$,(B $B!V(Bthat is, multiple
inputs which hash to the same value$B!W(B $B$G$9$h$M$'(B
 $B$J$i!"F|K\8l$b(B
 ``$B>WFM(B''($BJ#?t$NF~NO$,F1$8CM$K%O%C%7%e$5$l$k$3$H(B) $B$r8+IU$1$k(B ...
 $B$H$J$k$H;W$$$^$9!#(B

