MD5 Collision Vulnerability: Generating Identical Hash Values From Two Different Computer Programs

Merkle-Damgård Construction

Abstract A common theme for cryptographic hashing algorithms is for them to be created, used, and trusted until a flaw is found, rendering the algorithm no longer cryptographically secure [1]. When such instances occur, many times the deprecated algorithm tends to still be in use, posing a significant security flaw …

Read moreMD5 Collision Vulnerability: Generating Identical Hash Values From Two Different Computer Programs

About Me Part 1

Modded XBox controller schematic

During middle school, I was a huge Call of Duty 4 fan. I was part of a small clan, and would spend most of my weekends ranking up. I looked online for a modded controller, and many were well outside of my price range, with prices ranging from $100 — $200, depending on the features. My next thought was, how hard is it to make a modded controller?