I was reading the new Ars article about Microsoft's decision to retire SHA-1 due to its vulnerability to collision attacks. The article mentions the well-publicized Flame attack of 2012, a key ...
A design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions. The “secure enough” ...
1) It is trivial for someone to cause a collision (in fact effectively indefinitely many) with other inputs they control. 2) It's almost certainly not too hard for someone motivated to generate ...