您当前所在位置: 首页 > 学者

王小云

  • 268浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 103下载

  • 0评论

  • 引用

期刊论文

The Second-Preimage Attack on MD4

王小云Hongbo Yu Gaoli Wang Guoyan Zhang and Xiaoyun Wang

CANS 2005, LNCS 3810, pp. 1-12, 2005.,-0001,():

URL:

摘要/描述

In Eurocrypt'05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicable to explore the secondpreimage of MD4. About the second-preimage attack, they showed that a random message was a weak message with probability 2−122 and it only needed a one-time MD4 computation to find the second-preimage corresponding to the weak message. A weak message means that there exits a more efficient attack than the brute force attack to find its secondpreimage. In this paper, we find another new collision differential path which can be used to find the second-preimage for more weak messages. For any random message, it is a weak message with probability 2−56, and it can be converted into a weak message by message modification techniques with about 227 MD4 computations. Furthermore, the original message is close to the resulting message (weak message), i. e, the Hamming weight of the difference for two messages is about 44.

【免责声明】以下全部内容由[王小云]上传于[2006年09月21日 02时47分44秒],版权归原创者所有。本文仅代表作者本人观点,与本网站无关。本网站对文中陈述、观点判断保持中立,不对所包含内容的准确性、可靠性或完整性提供任何明示或暗示的保证。请读者仅作参考,并请自行承担全部责任。

我要评论

全部评论 0

本学者其他成果

    同领域成果