Closed
Description
If you are syncing a mix of trusted and untrusted data (such as VM images or databases), an attacker could corrupt synced data.
The easier attack is to generate collisions of the combined MD4/rolling sum in order to corrupt the file. This attack has almost no complexity for MD4, and in general for a 64-bit hash there's a birthday attack of 2^32 complexity.
With some effort a preimage could be generated (with any 64-bit hash, this has 2^64 complexity - maybe a better attack is possible with MD4). This would allow for malicious changes in synced files.
Metadata
Assignees
Labels
No labels