期刊文献+

对MD5的改进及其安全性分析 被引量:17

Improvement and security analysis on MD5
下载PDF
导出
摘要 针对MD5的碰撞攻击,分析了差分分析的步骤和方法;针对消息预处理导致了分组块数增加这一缺陷,提出了修改步函数的方法,能阻止选择好的差分路径,限制消息修改技术的使用,增强了抗碰撞攻击的能力。实验结果表明改进后算法的效率比消息预处理方案的效率高。 The method of differential analysis on collision attacks against MD5 was analyzed. Considering the increase of message blocks to be hashed via message pre-processing, a new method of modifying the step function of MD5 was proposed. The method can raise the resistibility of collision attack by preventing choosing a good differential path and limiting the use of message modification techniques. The efficiency of the improved algorithm is higher than that of method via message preprocessing.
出处 《计算机应用》 CSCD 北大核心 2009年第4期947-949,共3页 journal of Computer Applications
基金 国家973计划项目(2007CB310704) 国家自然科学基金资助项目(90718001) 高等学校学科创新引智计划资助项目(B08004)
关键词 HASH函数 MD5 碰撞攻击 差分分析 消息修改 Hash function MDS collision attack differential analysis message modification
  • 相关文献

参考文献13

  • 1RIVEST R. The MD5 message-digest algorithm, RFC 1321[ S]. Internet Activities Board, Intemet Privacy Task Force, 1992.
  • 2den BOER B , BOSSELAERS A . Collisions for the compression function of MD5[ C]// Advances in Cryptology - EUROCRYPT'93, LNCS 765. Heidelberg: Springer-Verlag, 1994:293-304.
  • 3DOBBERTINH. CryptanalysisofMD5 compress[ EB/OL]. [ 2008 -09 -20]. http://citeseer, ist. psu. edu/dobbertin96cryptanalysis, html.
  • 4WANG XIAO-YUN, FENG DENG-GUO, LAI XUE-JIA, et al. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD[ EB/OL]. [ 2008 - 09 - 20]. http://eprint, iacr. org/ 2004/199. pdf.
  • 5WANG XIAO-YUN, YU HONG-BO. How to break MD5 and other hash functions[ C]//Advances in Cryptology - EUROCRYPT 2005, LNCS 3494. Heidelberg: Spfinger-Verlag, 2005:19-35.
  • 6HAWKES P, PADDON M, ROSE G. Musings on the Wang et al. MD5 collision[ EB/OL]. [ 2008 - 09 - 12]. http://eprint, iacr. org/2004/264, pdf.
  • 7KLIMA V. Finding MD5 collisions on a notebook PC using multimessage modifications[ EB/OL]. [2008 -09 - 10]. http://eprint. iacr. org/2005/102, pdf.
  • 8SASAKI Y, NAITO Y, KUNIHIRO N, et al. Improved collision attack on MD5[ EB/OL]. [2005 -09 - 10]. http://eprint, iacr. org/ 2005/400. pdf.
  • 9SASAKI Y, NAITO Y, YAJIMA J, et al. How to construct sufficient condition in searching collisions of MD5[ EB/OL]. [ 2008 -09 - 10]. http://epfint, iacr. org/2006/74, pdf.
  • 10BLACK J, COCHRAN M, HIGHLAND T. A study of the MD5 attacks: Insights and improvements[ C] // Proceedings of the 13th International Workshop on Fast Software Encryption: FSE 2006, LNCS 4047. Heidelberg: Springer-Verlag, 2006:262-277.

同被引文献90

引证文献17

二级引证文献99

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部