会议专题

Differential Cryptanalysis of Hash Functions Based on Evolutionary Computing

We use the evolutionary computation to study cryptographic hash functions. In finding collisions of hash functions, evolutionary algorithm can be used to find collisions of MD4 and MD5. In this paper, firstly we explain some basic idea about the evolutionary cryptography design and analysis. Then we present an algorithm that reduces the number of trials for finding collisions. Instead of manual computing, by evolutionary computing we can find new differential paths and new collision forms for MD4. For MD5, we use evolutionary computing to find “good bits that make more conditions satisfied. By restricting search space, we can reduce search operation to 234 for the first block and 230 for the second block.

Evolutionary computing MD4 MD5 Differential attacks

Zhangyi Wang Bangju Wang Huanguo Zhang

School of Computer Science, State Key Lab of Software Engineering, Wuhan University.Wuhan 430072, Hu School of Computer Science, Wuhan University.Wuhan 430072, Hubei, China

国际会议

The Second International Symposium on Intelligence Computation and Applications(ISICA 2007)(第二届智能计算及其应用国际会议)

武汉

英文

2007-09-21(万方平台首次上网日期,不代表论文的发表时间)