已为您找到该学者10条结果 成果回收站
【期刊论文】How to Break MD5 and Other Hash Functions
王小云, Xiaoyun Wang and Hongbo Yu
EUROCRYPT 2005, LNCS 3494, pp. 19-35, 2005.,-0001,():
-1年11月30日
MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-start collision, in which the initialvalue of the hash function is replaced by a non-standard value, which is the result of the attack. In this paper we present a new powerful attack on MD5 which allows us to find collisions efficiently. We used this attack to find collisions of MD5 in about 15 minutes up to an hour computation time. The attack is a differential attack, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure. We call this kind of differential a modular differential. An application of this attack to MD4 can find a collision in less than a fraction of a second. This attack is also applicable to other hash functions, such as RIPEMD and HAVAL.
-
377浏览
-
0点赞
-
0收藏
-
0分享
-
229下载
-
0
-
引用
【期刊论文】Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
王小云, Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
,-0001,():
-1年11月30日
-
1636浏览
-
0点赞
-
0收藏
-
0分享
-
201下载
-
0
-
引用
王小云, 王小云**, 冯登国, 于秀源
中国科学E辑信息科学,2005,35(3):1~12,-0001,():
-1年11月30日
给出了一种Hash函数HAVAL-128的有效攻击方法. HAVAL是由zheng等人在Auscrypto'92提出的,它的轮数可以是3、4或5,输出长度为128、160、192或224比特的杂凑值本文攻击的是具有128比特杂凑值的HAVAL算法本文的主要结论是,任给一个1024比特长的消息m,只要对m做一些适当的修改,修改后的消息m就会和另外一个消息m'以2-7的概率发生碰撞,其中m'=m+△m,△m是事先选定的一个固定的明文差分另外,本文还给出了两个碰撞的实例.
Hash函数, 碰撞, 差分分析, 差分特征
-
212浏览
-
0点赞
-
0收藏
-
0分享
-
154下载
-
0
-
引用
【期刊论文】Finding Collisions in the Full SHA-1
王小云, Xiaoyun Wang*, Yiqun Lisa Yin, and Hongbo Yu
Crypto 2005, LNCS 3621, pp. 17-36, 2005.,-0001,():
-1年11月30日
In this paper, we present new collision search attacks on the hash function SHA-1. We show that collisions of SHA-1 can be found with complexity less than 269 hash operations. This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound.
Hash functions,, collision search attacks,, SHA-1,, SHA-0
-
185浏览
-
0点赞
-
0收藏
-
0分享
-
146下载
-
0
-
引用
【期刊论文】The Differential Analysis of Reduced Skipjack Variants
王小云, L. C. K. Hui*, X. Y. Wang*, K. P. Chow*, W. W. Tsang*, C. F. Chong*, H. W. Chan*
,-0001,():
-1年11月30日
In this paper, we use the a 12-round differential (5-16 rounds) to analyze the reduced Skipjack variants starting from the first round. The analysis result is that, breaking 1-21 rounds Skipjack variant needs about 217 chosen plaintexts and 264 encryptions, breaking 1-24 variant needs about 246 chosen plaintexts and 272 encryptions, and 1-26 variants needs about 246 chosen plaintexts and 260 encryptions.
-
65浏览
-
0点赞
-
0收藏
-
0分享
-
137下载
-
0
-
引用