期刊文献+

MD-4原象攻击的分析与改进

Analysis and improvement of preimage attack on MD-4
下载PDF
导出
摘要 首先分析了Leurent提出的MD-4原象攻击方法,该方法利用MD-4布尔函数的吸收性质,迭代函数的可逆性以及消息扩展方式的特殊性,首先形成伪原象攻击,之后利用基于树的方法将伪原象转变为原象攻击。采用随机图的方法,对其后一部分进行了改进,提高了攻击效率,将复杂度从2102降低到298。 The preimage attack of MD-4 is discussed.Leurent’s method explores chiefly three properties of MD-4:The absorption properties of boolean function,reversibility of the iterative process and specificity of message expansion.After their pseudo preimage attack a tree-based method is followed to transform pseudo preimage to true preimage.Tree-based method is replaced with random graph method.The complexity of the attack reduces to 2 ^98 from 2^ 102 .
出处 《计算机工程与应用》 CSCD 北大核心 2011年第9期112-114,共3页 Computer Engineering and Applications
基金 教育部科学技术研究重点项目(No.209156) 中央办公厅信息安全重点实验室基金项目(第六期)~~
关键词 HASH函数 消息摘要算法第4版 有向随机图 原象攻击 Hash function Message Digest-4 (MD-4) algorithm directed random graph preimage attack
  • 相关文献

参考文献16

  • 1Rivest R L.The MD4 message digest algorithm[C]//Crypo'90 Proceedings, 1991.
  • 2Rivest R L.RFC 1320 The MD5 message digest algorithm,re- quest for comments[S].Intemet Activities Board,Intemet Privacy Task Force, 1992.
  • 3Zheng Y, Pieprzyk J, Seberry J.HAVALA oneway Hashing algorithm with variable length of output[C]//Auscrypto'92 Proceedings, 1993 : 83-104.
  • 4Integrity primitives for secure information systems: Final RIPE report of RACE integrity primitives evalutiobn (RIPERACE 1040)[C]//Bosselaers A,Preneel B.LNCS 1007,1995.
  • 5FIPS 180-0 Secure Hash standard[S].NIST,US Department of Commerce, Washington DC, 1993.
  • 6FIPS 180-1 Secure Hash standard[S].NIST,US Department of Commerce, Washington D C: SpingerVerlag, 1995.
  • 7FIPS 180-2 Secure Hash standard[S/OL].2002.http://csrc.nist.gov/ publications/.
  • 8Wang X Y, Lai X J, Feng D G, et al.Cryptanalysis of the Hash functions MD4 and RIPEMD[C]//Advances in CryptologyEurocrypt 2005.[S.1.] : SpringerVerlag, 2005.
  • 9Wang X Y,Yu H B.How to break MD5 and other Hash funetion[C]//LNCS 3494: EUROCRYPT 2005,2005 : 19-35.
  • 10Wang X Y,Yu H B.Finding collisions in the full SHAI[C]// LNCS 3621 : CRYPTO 2005,2005:17-36.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部