Difference between revisions of "MD2"
From The ECRYPT Hash Function Website
(→Others) |
|||
Line 38: | Line 38: | ||
@article{dccRogierC97, | @article{dccRogierC97, | ||
author = {N. Rogier and Pascal Chauvaud}, | author = {N. Rogier and Pascal Chauvaud}, | ||
− | title = | + | title = {MD2 Is not Secure without the Checksum Byte}, |
journal = {Des. Codes Cryptography}, | journal = {Des. Codes Cryptography}, | ||
volume = {12}, | volume = {12}, |
Revision as of 18:08, 10 March 2008
Contents
1 Specification
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others
N. Rogier, Pascal Chauvaud - MD2 Is not Secure without the Checksum Byte