Difference between revisions of "MD4"
From The ECRYPT Hash Function Website
(→Collision Attacks) |
(→Second Preimage Attacks) |
||
| Line 89: | Line 89: | ||
=== Second Preimage Attacks === | === Second Preimage Attacks === | ||
| + | |||
| + | <bibtex> | ||
| + | @inproceedings{fseDobbertin98, | ||
| + | owner = {tnad}, | ||
| + | author = {Hans Dobbertin}, | ||
| + | title = {The First Two Rounds of MD4 are Not One-Way}, | ||
| + | pages = {284-292}, | ||
| + | editor = {Serge Vaudenay}, | ||
| + | booktitle = {FSE}, | ||
| + | publisher = {Springer}, | ||
| + | series = {LNCS}, | ||
| + | volume = {1372}, | ||
| + | year = {1998}, | ||
| + | isbn = {3-540-64265-X}, | ||
| + | abstract = {In [1] it was shown that there are very effective attacks leading | ||
| + | to collisions for the hash function MD4 designed by R. Rivest [3]. | ||
| + | A summary of the status of hash functions of the MD4-family with respect to | ||
| + | collision-resistence can be found in [2] and [4]. However, attacking the one-wayness | ||
| + | of a hash function is a much more demanding challenge, and in case of success it has much more devastating | ||
| + | consequences. No result along this line is known for MD4 and its | ||
| + | successors. Therefore it is worth to explore how the recently developed | ||
| + | new analytic methods for finding collisions can be applied to construct | ||
| + | preimages or second preimages. As a first step, we state here the following partial result.}, | ||
| + | url = {http://dx.doi.org/10.1007/3-540-69710-1_19} | ||
| + | } | ||
| + | </bibtex> | ||
---- | ---- | ||
Revision as of 18:45, 10 March 2008
Contents
1 Specification
- digest size: 128 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 128-bit chaining variable
- Specification:
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
Hans Dobbertin - Cryptanalysis of MD4
- J. Cryptology 11(4):253-271,1998
- http://link.springer.de/link/service/journals/00145/bibs/11n4p253.html
BibtexAuthor : Hans Dobbertin
Title : Cryptanalysis of MD4
In : J. Cryptology -
Address :
Date : 1998
Hans Dobbertin - Cryptanalysis of MD4
- FSE 1039:53-69,1996
- http://dx.doi.org/10.1007/s001459900047
BibtexAuthor : Hans Dobbertin
Title : Cryptanalysis of MD4
In : FSE -
Address :
Date : 1996
Serge Vaudenay - On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
- FSE 1008:286-297,1995
- http://dx.doi.org/10.1007/3-540-60590-8_22
BibtexAuthor : Serge Vaudenay
Title : On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
In : FSE -
Address :
Date : 1995
2.4 Second Preimage Attacks
Hans Dobbertin - The First Two Rounds of MD4 are Not One-Way
- FSE 1372:284-292,1998
- http://dx.doi.org/10.1007/3-540-69710-1_19
BibtexAuthor : Hans Dobbertin
Title : The First Two Rounds of MD4 are Not One-Way
In : FSE -
Address :
Date : 1998