[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: computer-go: Authenticating the identity of a remote go-playing computer program
Don Dailey writes:
> Yes, this is exactly equivalent to the birthday paradox. The
> protection we are looking for in the context of our discussion,
> however, is not a birthday paradox issue. The characteristic we would
> desire is that it should be incredibly difficult to produce a
> "tampered with" version of a SPECIFIC program. So we are still talking
> about 2^128, not 2^64.
True in the sense that the programmer cannot (without an effort of
order 2^128) a posteriori create a new program that matches the MD5
checksum sent to the organizers. However, she can create programs with
the same checksum a priori using birthday paradox. Of course, this may
be completely useless in this specific setting (whatever it is :)
--
Mika Kojo
SSH Communications Security Corp