期刊文献+

MD5碰撞攻击的多重消息修改技术的研究 被引量:3

Research on the multi-message modification techniques on MD5
下载PDF
导出
摘要 通过对王小云等提出的消息修改技术以及YuSasaki等提出改进的消息修改技术进行研究,指出他们提出的多重消息修改技术并不总能使一个链接变量同时满足多个充分条件,并给出了确保一个链接变量同时满足多个充分条件的方法。此外还指出了在LiangJie和LaiXuejia的新的充分条件集中YuSasaki等的改进的多重消息修改技术对其中2个条件不能再实施,并提出了对其中一个新的消息修改技术,给出了对另外3个充分条件的新的多重消息修改技术,并通过实验对上述结果进行了验证且产生了新的MD5碰撞对。 According to research on the message modification techniques presented by Wang Xiaoyun et al and the ad- vanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to make a chaining value satisfy several sufficient conditions simultaneously and with it a method was presented to make it up. Moreover, two of the sufficient conditions were pointed out since they are no longer able to be modified by the method presented by Yu Sasaki et al in the new set of sufficient conditions proposed by Liang Jie and Lai Xuejia, and a new method was proposed to make one of them satisfied deterministically. Additionally, new multi-message modification techniques were presented to modify the other three sufficient conditions. Finally, the results are tested by computer simulations and produce new collision pairs for MD5.
出处 《通信学报》 EI CSCD 北大核心 2009年第8期89-95,共7页 Journal on Communications
关键词 MD5 消息修改技术 多重消息修改技术 碰撞攻击 MD5 message modification techniques multi-message modification techniques collision attack
  • 相关文献

参考文献8

  • 1WANG X Y, FENG D G, LAI X J, et al. Collisions for Hash Functions MD4, MDS, HAVAL-128 and RIPEMD[R]. Cryptology ePrint Archive, Report 2004/199, 2004.
  • 2HAWKES P, PADDON M, ROSE G G. Musings on the Wang et al. MD5 Collision[R]. Cryptology ePrint Archive, Report 2004/264, 2004.
  • 3WANG X Y, YU H B. How to break MD5 and other hash functions[A]. Advances in EUROCRPT 2005[C]. 2005. 19-35.
  • 4SASAKI Y, NAITO Y, KUNIHIRO N, et al. Improved collision attack on MD5 [EB/OL]. Cryptology ePrint Archive 2005/400, 2005.
  • 5LIANG J, LAI X J. Improved collision attack on hash function MD5 [EB/OL]. Cryptology ePrint Archive 2005/425.
  • 6王张宜,张焕国,覃中平,孟庆树.A Fast Attack Algorithm on the MD5 Hash Function[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):140-145. 被引量:5
  • 7CHEN G T. A Study of Collision Cryptanalysis Against MD4 and MD5[D]. National Chiao Tung University at Hsinchu, Taiwan, 2006.
  • 8KLIMA V. Tunnels in hash functions: MD5 collisions within a minute [EB/OL], Cryptology ePrint Archive 2006/105, 2006.

共引文献4

同被引文献26

  • 1苗专生.学校机房管理系统的设计与实现[J].苏州科技学院学报(自然科学版),2006,23(2):77-80. 被引量:15
  • 2Wang X Y, Feng D G, and Lai X J, et al.. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD[EB/OL]. Cryptology ePrint Archive, Report 2004/199, 2004.
  • 3Wang X Y and Yu H B. How to break MD5 and other hash functions [C]. Eurocrypt' 05, Berlin, 2005, LNCS 3494: 19-35.
  • 4Yu S, Yusuke N, and Jun Y, et al.. How to construct sufficient condition in searching collisions of MD5 [EB/OL]. Cryptology ePrint Archive, Report 2006/074, 2006.
  • 5Xie T, Feng D G, and Liu F B. A new collision differential for MD5 with its full differential path[EB/OL]. Cryptology ePrint Archive, Report 2008/230, 2008.
  • 6Chen S W and Jin C H. An improved collision attack on MD5 algorithm[C]. Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31- September 5, 2007, Lecture Notes in Computer Science, 2007, Vol. 4990: 343-357.
  • 7Joux A. Multicollisions in Iterated hash functions[C]. CRYPTO 2004, Berlin: Springer- Verlag, 2004. LNCS: 3152, 306-316.
  • 8Kelsey J and Schneier B. Second preimages on n-bit hash functions for much less than 2" work[C]. Eurocrypt 2005, Berlin: Springer-Verlag, 2005, LNCS 3494: 19-35.
  • 9Kelsey J and Kohno T. Herding hash functions and the Nostradamus attacl[C]. Eurocrypt 2006, Berlin: Springer- Verlag, 2006, LNCS 4004: 183-200.
  • 10Wang Xiaoyun, Feng Dengguo, Lai Xuejia, et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD[EB/OL]. [2011-12-20]. http://eprint.iacr.org/2004/199.

引证文献3

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部