跳到主要导航 跳到搜索 跳到主要内容

The second-preimage attack on MD4

  • Hongbo Yu*
  • , Gaoli Wang
  • , Guoyan Zhang
  • , Xiaoyun Wang
  • *此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

In Eurocrypt'05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicable to explore the second-preimage of MD4. About the second-preimage attack, they showed that a random message was a weak message with probability 2-122 and it only needed a one-time MD4 computation to find the second-preimage corresponding to the weak message. A weak message means that there exits a more efficient attack than the brute force attack to find its second-preimage. In this paper, we find another new collision differential path which can be used to find the second-preimage for more weak messages. For any random message, it is a weak message with probability 2 -56, and it can be converted into a weak message by message modification techniques with about 227 MD4 computations. Furthermore, the original message is close to the resulting message (weak message), i.e, the Hamming weight of the difference for two messages is about 44.

源语言英语
主期刊名Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings
出版商Springer Verlag
1-12
页数12
ISBN(印刷版)3540308490, 9783540308492
DOI
出版状态已出版 - 2005
已对外发布
活动4th International Conference on Cryptology and Network Security, CANS 2005 - Xiamen, 中国
期限: 14 12月 200516 12月 2005

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3810 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议4th International Conference on Cryptology and Network Security, CANS 2005
国家/地区中国
Xiamen
时期14/12/0516/12/05

指纹

探究 'The second-preimage attack on MD4' 的科研主题。它们共同构成独一无二的指纹。

引用此