Difference between revisions of "MD4"
(→Cryptanalysis) |
(→Others) |
||
Line 122: | Line 122: | ||
=== Others === | === Others === | ||
+ | <bibtex> | ||
+ | @inproceedings{fseSchlafferO06, | ||
+ | author = {Martin Schläffer and Elisabeth Oswald}, | ||
+ | title = {Searching for Differential Paths in MD4}, | ||
+ | pages = {242-261}, | ||
+ | url = {http://dx.doi.org/10.1007/11799313_16}, | ||
+ | booktitle = {FSE}, | ||
+ | publisher = {Springer}, | ||
+ | series = {LNCS}, | ||
+ | volume = {4047}, | ||
+ | year = {2006}, | ||
+ | isbn = {3-540-36597-4}, | ||
+ | abstract = {The ground-breaking results of Wang et al. | ||
+ | have attracted a lot of attention to the collision resistance | ||
+ | of hash functions. In their articles, Wang et al. give input | ||
+ | differences, differential paths and the corresponding conditions | ||
+ | that allow to find collisions with a high probability. However, | ||
+ | Wang et al. do not explain how these paths were found. The common | ||
+ | assumption is that they were found by hand with a great deal of intuition. | ||
+ | In this article, we present an algorithm that allows to find paths | ||
+ | in an automated way. Our algorithm is successful for MD4. We have found | ||
+ | over 1000 differential paths so far. Amongst them, there are paths that | ||
+ | have fewer conditions in the second round than the path of Wang et al. | ||
+ | for MD4. This makes them better suited for the message modification techniques | ||
+ | that were also introduced by Wang et al.} | ||
+ | } |
Revision as of 10:23, 11 March 2008
Contents
1 Specification
- digest size: 128 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 128-bit chaining variable
- Specification:
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
Hans Dobbertin - Cryptanalysis of MD4
- J. Cryptology 11(4):253-271,1998
- http://link.springer.de/link/service/journals/00145/bibs/11n4p253.html
BibtexAuthor : Hans Dobbertin
Title : Cryptanalysis of MD4
In : J. Cryptology -
Address :
Date : 1998
Hans Dobbertin - Cryptanalysis of MD4
- FSE 1039:53-69,1996
- http://dx.doi.org/10.1007/s001459900047
BibtexAuthor : Hans Dobbertin
Title : Cryptanalysis of MD4
In : FSE -
Address :
Date : 1996
Serge Vaudenay - On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
- FSE 1008:286-297,1995
- http://dx.doi.org/10.1007/3-540-60590-8_22
BibtexAuthor : Serge Vaudenay
Title : On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
In : FSE -
Address :
Date : 1995
2.4 Second Preimage Attacks
2.5 Preimage Attacks
Hans Dobbertin - The First Two Rounds of MD4 are Not One-Way
- FSE 1372:284-292,1998
- http://dx.doi.org/10.1007/3-540-69710-1_19
BibtexAuthor : Hans Dobbertin
Title : The First Two Rounds of MD4 are Not One-Way
In : FSE -
Address :
Date : 1998
2.6 Others
<bibtex> @inproceedings{fseSchlafferO06,
author = {Martin Schläffer and Elisabeth Oswald}, title = {Searching for Differential Paths in MD4}, pages = {242-261}, url = {http://dx.doi.org/10.1007/11799313_16}, booktitle = {FSE}, publisher = {Springer}, series = {LNCS}, volume = {4047}, year = {2006}, isbn = {3-540-36597-4}, abstract = {The ground-breaking results of Wang et al.
have attracted a lot of attention to the collision resistance of hash functions. In their articles, Wang et al. give input differences, differential paths and the corresponding conditions that allow to find collisions with a high probability. However, Wang et al. do not explain how these paths were found. The common assumption is that they were found by hand with a great deal of intuition. In this article, we present an algorithm that allows to find paths in an automated way. Our algorithm is successful for MD4. We have found over 1000 differential paths so far. Amongst them, there are paths that have fewer conditions in the second round than the path of Wang et al. for MD4. This makes them better suited for the message modification techniques that were also introduced by Wang et al.} }