MD5

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

  • digest size: 128 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 128-bit chaining variable
  • Specification: RFC1321

2 Cryptanalysis

2.1 Best Known Results

The best known collision attack is due to Klima with a complexity of 229 effort.


2.2 Generic Attacks


2.3 Collision Attacks

Gaëtan Leurent - Message Freedom in MD4 and MD5 Collisions: Application to APOP
In Proceedings of FSE, LNCS 4593, pp. 309-328, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Gaëtan Leurent
Title : Message Freedom in MD4 and MD5 Collisions: Application to APOP
In : In Proceedings of FSE -
[Abstract]

Marc Stevens, Arjen K. Lenstra, Benne de Weger - Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
In Proceedings of EUROCRYPT, LNCS 4515, pp. 1-22, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Marc Stevens, Arjen K. Lenstra, Benne de Weger
Title : Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
In : In Proceedings of EUROCRYPT -
[Abstract]

Xiaoyun Wang, Hongbo Yu - How to Break MD5 and Other Hash Functions
In Proceedings of EUROCRYPT, LNCS 3494, pp. 19-35, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Xiaoyun Wang, Hongbo Yu
Title : How to Break MD5 and Other Hash Functions
In : In Proceedings of EUROCRYPT -
[Abstract]

Bert den Boer, Antoon Bosselaers - Collisions for the Compression Function of MD5
In Proceedings of EUROCRYPT, , pp. 293-304, 1993
[Electronic Edition] [Bibtex]
Author : Bert den Boer, Antoon Bosselaers
Title : Collisions for the Compression Function of MD5
In : In Proceedings of EUROCRYPT -
[Abstract]

Thomas A. Berson - Differential Cryptanalysis Mod 2^32 with Applications to MD5
In Proceedings of EUROCRYPT, LNCS 658, pp. 71-80, 1993
[Electronic Edition] [Bibtex]
Author : Thomas A. Berson
Title : Differential Cryptanalysis Mod 2^32 with Applications to MD5
In : In Proceedings of EUROCRYPT -
[Abstract]

2.4 Second Preimage Attacks


2.5 Preimage Attacks

Yu Sasaki, Kazumaro Aoki - Preimage Attacks on Step-Reduced MD5
In Proceedings of ACISP, LNCS 5107, pp. 282-296, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Yu Sasaki, Kazumaro Aoki
Title : Preimage Attacks on Step-Reduced MD5
In : In Proceedings of ACISP -
[Abstract]

2.6 Others

John Black, Martin Cochran, Trevor Highland - A Study of the MD5 Attacks: Insights and Improvements
In Proceedings of FSE, LNCS 4047, pp. 262-277, Springer, 2006
[Electronic Edition] [Bibtex]
Author : John Black, Martin Cochran, Trevor Highland
Title : A Study of the MD5 Attacks: Insights and Improvements
In : In Proceedings of FSE -
[Abstract]
Personal tools