We announce two different Win32 executable files with different functionality but identical MD5 hash values. This shows that trust in MD5 as a tool for verifying software integrity, and as a hash function used in code signing, has become questionable. Software is vulnerable to threats on its integrity. For example, when a program is made available as an executable file on the web for downloading,
ã¢ã¤ã³ããã¼ãã§ã³å·¥ç§å¤§å¦(TUE)ã®Benne de WegerãCWIã®Marc Stevensããã«ç ã®Arjen Lenstraãã»ãã¥ãªãã£ç 究è 3åããSonyã®PlayStation 3ä¸å°ã使ç¨ãã¦2008å¹´ç±³å½å¤§çµ±é é¸æã®çµæãæ£ç¢ºã«äºç¥ããã¨çºè¡¨ãã(Predicting the winner of the 2008 US Presidential Elections using a Sony PlayStation 3)ããæ権è ã¸ã®å½±é¿ãèæ ®ãã¦äºç¥çµæã¯é¸æå¾ã¾ã§ç§å¯ã¨ããããäºç¥çµæãè¨å ¥ãããã¡ã¤ã«ãå¾ã§æ¹ç«ããã¦ããªããã¨ã証æããããããã¡ã¤ã«ã®ãã£ã³ã¬ã¼ããªã³ããã¦ã§ããµã¤ãã§å ¬éãã¦ãããã¨ãã¦MD5ããã·ã¥ã®å¤ãå ¬éãã¦ããã ã¨ãããããªã¿ã¬ã³ãã ã£ããããªã³ã¯å ã®ä¸ã®æ¹ãæ¬å®¶/.ã®è¨äºã«ãããããã«ãçºè¡¨ãã人ã ãæ¬å½ã«è¨ãããã£ãã®ã¯ãMD5ã¯
ã©ã³ãã³ã°
ãç¥ãã
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}