Avalanche of MD5
MD5 is one of the most widely used cryptographic hash functions, known researches show that it cant hold some key security properties such as avalanche effect. Since Wang introduced the first collision attack on MDS in 2004, a lot of work has been done, which mainly focusing on improving the attack efficiency, including Xie presented 1 bit input difference which collided in a second. However, why the attack succeed still remains lack of explanation in open literature, this paper presents systematic analysis of why and how the collision attack on MDS can be implemented, focusing on vulnerability analysis including the MSB bit problem in modular addition, difference inheritance problem and the way of message expanding lack of diffusion and confusion, and discussing how to employ these vulnerabilities to launch successful MDS differential attack which consists of input difference selecting, differential path constructing, collision searching algorithm. Further, we recommend a new input difference which can be collided in milliseconds.
MDS collision attack vulnerability analysis differential path avalance effect
Fanbao Liu Yi Liu Xing Zhang
School of Computer National University of Defense Technology, 410073 Changsha, Hunan, China Trusted Computing Lab, School of Computer Beijing University of Technology, 100124 Beijing, China
国际会议
成都
英文
252-257
2010-12-17(万方平台首次上网日期,不代表论文的发表时间)