首页 | 本学科首页   官方微博 | 高级检索  
     检索      

A Fast Attack Algorithm on the MD5 Hash Function
作者姓名:王张宜  张焕国  覃中平  孟庆树
作者单位:School of Computer Science Wuhan Univ. Wuhan 430072 China,School of Computer Science Wuhan Univ. Wuhan 430072 China,School of Software Huazhong Univ. of Science and Tech. Wuhan 430079,School of Computer Science Wuhan Univ. Wuhan 430072 China
基金项目:NationalNaturalScienceFoundationofChina(Nos.90104005,60373087)andPh.D.Pro-gramsFoundationofMinistryofEducationofChina(No.20020486046)
摘    要:Introduction Cryptographichashfunctions1-3]areimportant cryptographicprimitivesandusedinauthentica-tion,non-repudiation,electroniccommerceand encryptionschemes.Cryptographichashfunctions havetosatisfyrequirementsofonewaynessand collisionresistance4-7].Onesuchfamilyofhash functionsistheMDxfamily.Thisfamilyincludes hashfunctionssuchasMD5,SHA-1and RIPEMD-160.TheMD5hashfunctionwasproposedby Rivest2].AnattackonMD5waspresentedby Wang8].Butthedetailofattackalgorithmwasnot discovereduntil…

关 键 词:计算方法  攻击方法  MD5  脉冲干扰
文章编号:1007-1172(2006)02-0140-06
收稿时间:2005-10-10

A Fast Attack Algorithm on the MD5 Hash Function
WANG Zhang-yi,ZHANG Huan-guo,QIN Zhong-ping,MENG Qing-shu.A Fast Attack Algorithm on the MD5 Hash Function[J].Journal of Shanghai Jiaotong university,2006,11(2):140-145,151.
Authors:WANG Zhang-yi  ZHANG Huan-guo  QIN Zhong-ping  MENG Qing-shu
Abstract:The sufficient conditions for keeping desired differential path of MD5 was discussed. By analyzing the expanding of subtraction difference, differential characters of Boolean functions, and the differential characters of shift rotation, the sufficient conditions for keeping desired differential path could be obtained. From the differential characters of shift rotation, the lacked sufficient conditions were found. Then an algorithm that reduces the number of trials for finding collisions were presented. By restricting search space, search operation can be reduced to 2 34 for the first block and 2 30 for the second block. The whole attack on the MD5 can be accomplished within 20 hours using a PC with 1.6 G CPU.
Keywords:MD5  differential attacks  collision
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号