Difference between revisions of "MD5"

From The ECRYPT Hash Function Website
 
(Others)
Line 34: Line 34:
  
 
=== Others ===
 
=== Others ===
 +
@inproceedings{fseBlackCH06,
 +
  author    = {John Black and Martin Cochran and Trevor Highland},
 +
  title    = {A Study of the MD5 Attacks: Insights and Improvements},
 +
  pages    = {262-277},
 +
  url        = {http://dx.doi.org/10.1007/11799313_17},
 +
  booktitle = {FSE},
 +
  publisher = {Springer},
 +
  series    = {LNCS},
 +
  volume    = {4047},
 +
  year      = {2006},
 +
  isbn      = {3-540-36597-4},
 +
  abstract  = {MD5 is a well-known and widely-used cryptographic
 +
hash function. It has received renewed attention from researchers
 +
subsequent to the recent announcement of collisions found by Wang et al. [16].
 +
To date, however, the method used by researchers in this work has been fairly
 +
difficult to grasp. In this paper we conduct a study of all attacks on MD5 starting
 +
from Wang. We explain the techniques used by her team, give insights on how to improve
 +
these techniques, and use these insights to produce an even faster attack on MD5.
 +
Additionally, we provide an “MD5 Toolkit” implementing these improvements that we
 +
hope will serve as an open-source platform for further research. Our hope is that
 +
a better understanding of these attacks will lead to a better understanding of our
 +
current collection of hash functions, what their strengths and weaknesses are, and
 +
where we should direct future efforts in order to produce even stronger primitives.}
 +
}

Revision as of 10:31, 11 March 2008

1 Specification

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

@inproceedings{fseBlackCH06,

 author    = {John Black and Martin Cochran and Trevor Highland},
 title     = {A Study of the MD5 Attacks: Insights and Improvements},
 pages     = {262-277},
 url        = {http://dx.doi.org/10.1007/11799313_17},
 booktitle = {FSE},
 publisher = {Springer},
 series    = {LNCS},
 volume    = {4047},
 year      = {2006},
 isbn      = {3-540-36597-4},
 abstract  = {MD5 is a well-known and widely-used cryptographic

hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp. In this paper we conduct a study of all attacks on MD5 starting from Wang. We explain the techniques used by her team, give insights on how to improve these techniques, and use these insights to produce an even faster attack on MD5. Additionally, we provide an “MD5 Toolkit” implementing these improvements that we hope will serve as an open-source platform for further research. Our hope is that a better understanding of these attacks will lead to a better understanding of our current collection of hash functions, what their strengths and weaknesses are, and where we should direct future efforts in order to produce even stronger primitives.} }