• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

How to break MD5 and other hash functions (2005)

Cached

  • Download as a PDF

Download Links

  • [merlot.usc.edu]
  • [merlot.usc.edu]
  • [saluc.engr.uconn.edu]
  • [merlot.usc.edu]
  • [www.cems.uwe.ac.uk]
  • [securespeech.cs.cmu.edu]
  • [www.infosec.sdu.edu.cn]
  • [www.cs.cmu.edu]
  • [www.infosec.sdu.edu.cn]
  • [www.iacr.org]
  • [www.iacr.org]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Xiaoyun Wang , Hongbo Yu
Venue:In EUROCRYPT
Citations:317 - 7 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Wang05howto,
    author = {Xiaoyun Wang and Hongbo Yu},
    title = {How to break MD5 and other hash functions},
    booktitle = {In EUROCRYPT},
    year = {2005},
    publisher = {Springer-Verlag}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-start collision, in which the initial value of the hash function is replaced by a non-standard value, which is the result of the attack. In this paper we present a new powerful attack on MD5 which allows us to find collisions efficiently. We used this attack to find collisions of MD5 in about 15 minutes up to an hour computation time. The attack is a differential attack, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure. We call this kind of differential a modular differential. An application of this attack to MD4 can find a collision in less than a fraction of a second. This attack is also applicable to other hash functions, such as RIPEMD and HAVAL. 1

Keyphrases

hash function    differential attack    known result    several author    initial value    hour computation time    new powerful attack    semi free-start collision    modular integer subtraction    non-standard value    cryptographic hash function    modular differential   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University