期刊文献+

MD5差分和差分路径的自动化构造算法 被引量:3

The Automatic Algorithm to Construct Difference and Differential Path in MD5
下载PDF
导出
摘要 为了得到较好的差分,差分路径和充分条件,考察了MD5算法和差分攻击算法的原理,给出并证明了循环移位差分四种情况的概率,提出了MD5差分路径和充分条件的自动化构造算法,将构造差分和构造差分路径相结合,调整了搜索步长,提高了构造的成功概率。试验结果表明:得出的新差分路径重量为50,所需充分条件为272。 For Finding good difference,differential path and sufficient conditions,the theory of MD5 and differential attack algorithm were analyzed,four probabilities of circle shifting difference were proved,and the automatic algorithm to construct difference and differential path in MD5 were proposed.By combining the construction of difference with differential path and modifying the length of searching step,the successful probability of construction was promoted.Experiments showed that this differential path's HW is 50,and 272 sufficient conditions is needed.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2010年第6期133-137,共5页 Journal of Sichuan University (Engineering Science Edition)
基金 国家高技术研究发展计划资助项目(2009AA01Z417) 国家自然科学基金资助项目(2007B74)
关键词 MD5 HASH函数 差分攻击 隧道技术 多消息修正方法 MD5 Hash functions differential attack tunnel technique multi-message modification method
  • 相关文献

同被引文献23

  • 1张学旺,唐贤伦.MD5算法及其在文件系统完整性保护中的应用[J].计算机应用,2003,23(z2):430-432. 被引量:20
  • 2王张宜,张焕国,覃中平,孟庆树.A Fast Attack Algorithm on the MD5 Hash Function[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):140-145. 被引量:5
  • 3Wang Xiaoyun, Feng Dengguo, Lai Xuejia, et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD[EB/OL]. [2011-12-20]. http://eprint.iacr.org/2004/199.
  • 4Stevens M, Lenstra A K, de Weger B. Vulnerability of Software Integrity and Code Signing Applications to Chosen-prefix Collisions for MD5[EB/OL]. [2011-12-20]. http://www.win. tue.nl/hashclash/SoftlntCodeSign.
  • 5Sasaki Y, Wang L, Ohta K, et al. Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack[C]// Proc. of CRYPTOLOGY'08. San Francisco, USA: Springer, 2008: 1-18.
  • 6Alexander S. MD5 Considered Harmful Today[EB/OL]. [2011- 11-20]. http ://www.win.tue.nl/hashclash/rogue-ca.
  • 7Wang Xiaoyun, Yu Hongbo. How to Break MD5 and Other Hash Functions[C]//Proc. of EUROCRYPT'05. Berlin, Germany: [s. n.], 2005: 19-35.
  • 8自洪欢.MD5快速碰撞算法之研究[D].杭州:浙江大学,2010.
  • 9Ugmbbc.可执行文件的MD5碰撞[EB/OL].[2011-12-10].http://www.cnbeta.corn/articles/59117.htm.
  • 10陈玮.MD5加密原理及安全性分析[J].电脑知识与技术,2007(10):87-88. 被引量:9

引证文献3

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部