Home > Papers

 
 
A Fast Attack on the MD5 Hash Function
Wang Zhangyi 1 * #,Zhang Huanguo 1,Qin Zhongping 2,Meng Qingshu 1
1.Wuhan University
2.Huazhong University of Science and Technology
*Correspondence author
#Submitted by
Subject:
Funding: 教育部博士点基金(No.20020486046)
Opened online:29 March 2006
Accepted by: none
Citation: Wang Zhangyi,Zhang Huanguo,Qin Zhongping .A Fast Attack on the MD5 Hash Function[OL]. [29 March 2006] http://en.paper.edu.cn/en_releasepaper/content/5977
 
 
MD5 is a hash function proposed by Rivest in 1992 [2]. In 2004, two-block collisions of MD5 were presented by Wang et al [8]. This paper builds on the work presented in Ref [8-10]. In this paper, firstly we discuss the sufficient conditions for keeping desired differential path. By analyzing the expanding of subtraction difference, differential characters of Boolean functions, and the differential characters of shift rotation, the sufficient conditions for keeping desired differential path could be obtained. From the differential characters of shift rotation, we find the lacked sufficient conditions in Ref [10]. Then we present an algorithm that reduces the number of trials for finding collisions.
Keywords:MD5; differential attacks; collision
 
 
 

For this paper

  • PDF (0B)
  • ● Revision 0   
  • ● Print this paper
  • ● Recommend this paper to a friend
  • ● Add to my favorite list

    Saved Papers

    Please enter a name for this paper to be shown in your personalized Saved Papers list

Tags

Add yours

Related Papers

Statistics

PDF Downloaded 671
Bookmarked 0
Recommend 5
Comments Array
Submit your papers