会议专题

Avalanche of MD5

MD5 is one of the most widely used cryptographic hash functions, known researches show that it cant hold some key security properties such as avalanche effect. Since Wang introduced the first collision attack on MDS in 2004, a lot of work has been done, which mainly focusing on improving the attack efficiency, including Xie presented 1 bit input difference which collided in a second. However, why the attack succeed still remains lack of explanation in open literature, this paper presents systematic analysis of why and how the collision attack on MDS can be implemented, focusing on vulnerability analysis including the MSB bit problem in modular addition, difference inheritance problem and the way of message expanding lack of diffusion and confusion, and discussing how to employ these vulnerabilities to launch successful MDS differential attack which consists of input difference selecting, differential path constructing, collision searching algorithm. Further, we recommend a new input difference which can be collided in milliseconds.

MDS collision attack vulnerability analysis differential path avalance effect

Fanbao Liu Yi Liu Xing Zhang

School of Computer National University of Defense Technology, 410073 Changsha, Hunan, China Trusted Computing Lab, School of Computer Beijing University of Technology, 100124 Beijing, China

国际会议

2010 International Conference on Information Security and Artificial Intelligence(2010年信息安全与人工智能国际会议 ISAI 2010)

成都

英文

252-257

2010-12-17(万方平台首次上网日期,不代表论文的发表时间)