Thread: Deep Hash
View Single Post
Old 2012-10-05, 17:14   #4
chalsall
If I May
 
chalsall's Avatar
 
"Chris Halsall"
Sep 2002
Barbados

100110000100012 Posts
Default

Quote:
Originally Posted by diep View Post
Well i'd like to design something that can work in parallel and work on gpu's and manycores and multicores which doesn't spread the illusion (be it true or false) that a few rainbow tables in combination with a 10 line genetic algorithm for a person handy with algorithms without being a cryptographer, can already have anyone add any trojan to any big file, say a linux distro image...
This statement alone suggests you are not the right person to design a new hash function accepted for public use.

I challenge you to change a publicly known file, let's say CentOS-6.3-i386-bin-DVD1.iso...

...and add the string "diep was here" anywhere in the file without changing the MD5 Hash of "0285160d8ba3cfc720ea55e98e464eac" nor the size of the file.

You are allowed to use as many rainbow tables and algorithms as you like in this challenge.
chalsall is offline   Reply With Quote