|
此文章由 pepsico 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 pepsico 所有!转贴必须注明作者、出处和本声明,并保持内容完整
原帖由 alewela 于 2012-6-18 14:40 发表 ![](http://www.oursteps.com.au/bbs/images/common/back.gif)
这里有一个误区。
网站或者操作系统保存的是密码的hash值,LinkedIn被盗的(或者Google将来可能被盗的)就是这种东西。hash是单方向的,也就是说没办法反方向从hash计算出密码来。破解hash只需要暴力计算所有可能的密码组合 ...
Not really, MD5 is one of hash implementation and being used very popular, includes UNIX password and web root CA etc. Normally it very safe.
But there is a software name Flame include MD5 "collision attack" can used try to create a fake authentic certificate maybe chained up to M$'s root CA. you can wiki Flame it's funny. It' first time to fine such advance codes in such sotware.
wooh! the world is too dangerous! |
|