Improved Collision Attack on MD4 with Probability Almost 1
In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, fi...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 145 |
---|---|
container_issue | |
container_start_page | 129 |
container_title | |
container_volume | |
creator | Naito, Yusuke Sasaki, Yu Kunihiro, Noboru Ohta, Kazuo |
description | In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al. |
doi_str_mv | 10.1007/11734727_12 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19689137</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19689137</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-47beb4aad60a176126abf5b09a8c42b305baec25ea01da7965cec810bd0cceb13</originalsourceid><addsrcrecordid>eNpNkDtPwzAUhc1Loi2d-ANZGBgC9_oRx2xVeVUqggEktujaccE0raM4AvXfU1SQmM6RzqczfIydIlwggL5E1EJqrivke2wolAQhhFKv-2yABWIuhDQHbGx0-bfJ8pANQADPjZbimA1T-gAArg0fsKvZqu3ip6-zaWyakEJcZ5O-J7fMtu3hWmZfoX_PnrpoyYYm9Jts0qxi6jM8YUcLapIf_-aIvdzePE_v8_nj3Ww6mectR9PnUltvJVFdAKEukBdkF8qCodJJbgUoS95x5QmwJm0K5bwrEWwNznmLYsTOdr8tJUfNoqO1C6lqu7CiblOhKUqDQm-58x2XttP6zXeVjXGZKoTqx1z1z5z4BvqNWpI</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Improved Collision Attack on MD4 with Probability Almost 1</title><source>Springer Books</source><creator>Naito, Yusuke ; Sasaki, Yu ; Kunihiro, Noboru ; Ohta, Kazuo</creator><contributor>Won, Dong Ho ; Kim, Seungjoo</contributor><creatorcontrib>Naito, Yusuke ; Sasaki, Yu ; Kunihiro, Noboru ; Ohta, Kazuo ; Won, Dong Ho ; Kim, Seungjoo</creatorcontrib><description>In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540333548</identifier><identifier>ISBN: 3540333541</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 354033355X</identifier><identifier>EISBN: 9783540333555</identifier><identifier>DOI: 10.1007/11734727_12</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Compression Function ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Exact sciences and technology ; Extra Condition ; Hash Function ; Information, signal and communications theory ; Input Message ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Success Probability ; Telecommunications and information theory</subject><ispartof>Information Security and Cryptology - ICISC 2005, 2006, p.129-145</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11734727_12$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11734727_12$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19689137$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Won, Dong Ho</contributor><contributor>Kim, Seungjoo</contributor><creatorcontrib>Naito, Yusuke</creatorcontrib><creatorcontrib>Sasaki, Yu</creatorcontrib><creatorcontrib>Kunihiro, Noboru</creatorcontrib><creatorcontrib>Ohta, Kazuo</creatorcontrib><title>Improved Collision Attack on MD4 with Probability Almost 1</title><title>Information Security and Cryptology - ICISC 2005</title><description>In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.</description><subject>Applied sciences</subject><subject>Compression Function</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Extra Condition</subject><subject>Hash Function</subject><subject>Information, signal and communications theory</subject><subject>Input Message</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Success Probability</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540333548</isbn><isbn>3540333541</isbn><isbn>354033355X</isbn><isbn>9783540333555</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAUhc1Loi2d-ANZGBgC9_oRx2xVeVUqggEktujaccE0raM4AvXfU1SQmM6RzqczfIydIlwggL5E1EJqrivke2wolAQhhFKv-2yABWIuhDQHbGx0-bfJ8pANQADPjZbimA1T-gAArg0fsKvZqu3ip6-zaWyakEJcZ5O-J7fMtu3hWmZfoX_PnrpoyYYm9Jts0qxi6jM8YUcLapIf_-aIvdzePE_v8_nj3Ww6mectR9PnUltvJVFdAKEukBdkF8qCodJJbgUoS95x5QmwJm0K5bwrEWwNznmLYsTOdr8tJUfNoqO1C6lqu7CiblOhKUqDQm-58x2XttP6zXeVjXGZKoTqx1z1z5z4BvqNWpI</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Naito, Yusuke</creator><creator>Sasaki, Yu</creator><creator>Kunihiro, Noboru</creator><creator>Ohta, Kazuo</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Improved Collision Attack on MD4 with Probability Almost 1</title><author>Naito, Yusuke ; Sasaki, Yu ; Kunihiro, Noboru ; Ohta, Kazuo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-47beb4aad60a176126abf5b09a8c42b305baec25ea01da7965cec810bd0cceb13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Compression Function</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Extra Condition</topic><topic>Hash Function</topic><topic>Information, signal and communications theory</topic><topic>Input Message</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Success Probability</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Naito, Yusuke</creatorcontrib><creatorcontrib>Sasaki, Yu</creatorcontrib><creatorcontrib>Kunihiro, Noboru</creatorcontrib><creatorcontrib>Ohta, Kazuo</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Naito, Yusuke</au><au>Sasaki, Yu</au><au>Kunihiro, Noboru</au><au>Ohta, Kazuo</au><au>Won, Dong Ho</au><au>Kim, Seungjoo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Improved Collision Attack on MD4 with Probability Almost 1</atitle><btitle>Information Security and Cryptology - ICISC 2005</btitle><date>2006</date><risdate>2006</risdate><spage>129</spage><epage>145</epage><pages>129-145</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540333548</isbn><isbn>3540333541</isbn><eisbn>354033355X</eisbn><eisbn>9783540333555</eisbn><abstract>In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11734727_12</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information Security and Cryptology - ICISC 2005, 2006, p.129-145 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19689137 |
source | Springer Books |
subjects | Applied sciences Compression Function Computer science control theory systems Computer systems and distributed systems. User interface Cryptography Exact sciences and technology Extra Condition Hash Function Information, signal and communications theory Input Message Memory and file management (including protection and security) Memory organisation. Data processing Signal and communications theory Software Success Probability Telecommunications and information theory |
title | Improved Collision Attack on MD4 with Probability Almost 1 |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T14%3A20%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Improved%20Collision%20Attack%20on%20MD4%20with%20Probability%20Almost%201&rft.btitle=Information%20Security%20and%20Cryptology%20-%20ICISC%202005&rft.au=Naito,%20Yusuke&rft.date=2006&rft.spage=129&rft.epage=145&rft.pages=129-145&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540333548&rft.isbn_list=3540333541&rft_id=info:doi/10.1007/11734727_12&rft_dat=%3Cpascalfrancis_sprin%3E19689137%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=354033355X&rft.eisbn_list=9783540333555&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |