您当前所在位置: 首页 > 学者

王小云

  • 377浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 229下载

  • 0评论

  • 引用

期刊论文

How to Break MD5 and Other Hash Functions

王小云Xiaoyun Wang and Hongbo Yu

EUROCRYPT 2005, LNCS 3494, pp. 19-35, 2005.,-0001,():

URL:

摘要/描述

MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-start collision, in which the initialvalue of the hash function is replaced by a non-standard value, which is the result of the attack. In this paper we present a new powerful attack on MD5 which allows us to find collisions efficiently. We used this attack to find collisions of MD5 in about 15 minutes up to an hour computation time. The attack is a differential attack, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure. We call this kind of differential a modular differential. An application of this attack to MD4 can find a collision in less than a fraction of a second. This attack is also applicable to other hash functions, such as RIPEMD and HAVAL.

关键词:

【免责声明】以下全部内容由[王小云]上传于[2006年09月21日 02时48分36秒],版权归原创者所有。本文仅代表作者本人观点,与本网站无关。本网站对文中陈述、观点判断保持中立,不对所包含内容的准确性、可靠性或完整性提供任何明示或暗示的保证。请读者仅作参考,并请自行承担全部责任。

我要评论

全部评论 0

本学者其他成果

    同领域成果