The second-preimage attack on MD4

Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

42 Scopus citations

Abstract

In Eurocrypt'05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicable to explore the second-preimage of MD4. About the second-preimage attack, they showed that a random message was a weak message with probability 2-122 and it only needed a one-time MD4 computation to find the second-preimage corresponding to the weak message. A weak message means that there exits a more efficient attack than the brute force attack to find its second-preimage. In this paper, we find another new collision differential path which can be used to find the second-preimage for more weak messages. For any random message, it is a weak message with probability 2 -56, and it can be converted into a weak message by message modification techniques with about 227 MD4 computations. Furthermore, the original message is close to the resulting message (weak message), i.e, the Hamming weight of the difference for two messages is about 44.

Original languageEnglish
Title of host publicationCryptology and Network Security - 4th International Conference, CANS 2005, Proceedings
PublisherSpringer Verlag
Pages1-12
Number of pages12
ISBN (Print)3540308490, 9783540308492
DOIs
StatePublished - 2005
Externally publishedYes
Event4th International Conference on Cryptology and Network Security, CANS 2005 - Xiamen, China
Duration: 14 Dec 200516 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3810 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Cryptology and Network Security, CANS 2005
Country/TerritoryChina
CityXiamen
Period14/12/0516/12/05

Keywords

  • Collision differential path
  • Hash function
  • Second-preimage
  • Weak message

Fingerprint

Dive into the research topics of 'The second-preimage attack on MD4'. Together they form a unique fingerprint.

Cite this