期刊文献+

MD5算法破译过程解析 被引量:12

Cryptanalysis of deciphering MD5 algorithm
下载PDF
导出
摘要 MD5算法破译过程的解析:分析了MD5算法中逻辑函数的性质,阐述了两种差分的关系,详细论述了差分路径的控制过程。以王小云的研究数据为基础,从手工推算和程序两方面进行了测试和分析,进行了部分修正,进一步说明了控制差分路径的关键点,对Hash函数的破译分析有着重要的作用。 This paper is about the cryptanalysis of deciphering MD5 algorithm.The properties of the logical functions of the MD5 algorithm are analyzed.The relationships of two differential characteristics and the control process are proposed.Based on the research data provided by Wang,the algorithm is partly amended and deeply analyzed from both the manual calculation and the test program.The key points of controlling the differential paths are discussed.In general,this paper plays an important role in analyzing and breaking the Hash functions.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第19期109-112,共4页 Computer Engineering and Applications
关键词 MD5算法 差分分析 差分控制 MD5 differential analysis differential control
  • 相关文献

参考文献1

二级参考文献13

  • 1Ronald Rivest. The MD5 message digest algorithm.RFC1321, April 1999,http://rfc.net/rfc1321.html.
  • 2Ronald Rivest. The MD4 message digest algorithm.RFC1320, April 1992, http://rfc.net/rfc1320.html.
  • 3B den Boer, A. Bosselaers. Collisions for the compression function of MD5. In Proc. Advances in Cvyptology, EUROCRYPT'93, LNCS 765, Helleseth T (ed.), Springer-Verlag,Berlin, Germany, 1994, pp.293-304.
  • 4Dobbertin H, Cryptanalysis of MD5 compress. Rump session of Eurocrypt'96, http://www.cs.ucsd.edu/users/bsy/dobbertin.ps, 1996.
  • 5Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Rump session of Crypto'04, Cryptology ePrint Archive, Report2004/199, http://eprint.iacr.org/2004/199.pdf, 2004.
  • 6Xiaoyun Wang, Hongbo Yu. How to break MD5 and other hash functions. In Proc. Advances in Crytolog-EUROCRYPT 2005, LNCS3494, Cramer R (ed.), Springer-Verlag, pp.19-35.
  • 7Vlastimil Klima. Finding MD5 collisions on a notebook PC using multi-message modifications. In Proc. International Scientific Conference Security and Protection ofInformation 2005, Brno, Czech Republic, May 3-5, 2005,http://eprint.iacr.org/2005/102.pdf.
  • 8Patrick Stach. MD5 Collision Generator. (pstach@stachliu.com), http://www.stachliu.com, nyud.net:8090/md5collc.
  • 9Vlastimil Klima. Finding MD5 collisions--A toy for a notebook. Cryptology ePrint Archive, Report2005/075, March,2005, http://eprint.iacr.org/2005/075.pdf.
  • 10Zhang-Yi Wang, Huan-Guo Zhang, Zhong-Ping Qin, Qing-Shu Meng. A fast attack on the MD5 hash function. Journal of Shanghai Jiaotong University, 2006, 11(2): 140-145, 151.

共引文献11

同被引文献75

引证文献12

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部