Improved Collision Attack on MD4 with Probability Almost 1

In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, fi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Naito, Yusuke, Sasaki, Yu, Kunihiro, Noboru, Ohta, Kazuo
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 145
container_issue
container_start_page 129
container_title
container_volume
creator Naito, Yusuke
Sasaki, Yu
Kunihiro, Noboru
Ohta, Kazuo
description In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.
doi_str_mv 10.1007/11734727_12
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19689137</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19689137</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-47beb4aad60a176126abf5b09a8c42b305baec25ea01da7965cec810bd0cceb13</originalsourceid><addsrcrecordid>eNpNkDtPwzAUhc1Loi2d-ANZGBgC9_oRx2xVeVUqggEktujaccE0raM4AvXfU1SQmM6RzqczfIydIlwggL5E1EJqrivke2wolAQhhFKv-2yABWIuhDQHbGx0-bfJ8pANQADPjZbimA1T-gAArg0fsKvZqu3ip6-zaWyakEJcZ5O-J7fMtu3hWmZfoX_PnrpoyYYm9Jts0qxi6jM8YUcLapIf_-aIvdzePE_v8_nj3Ww6mectR9PnUltvJVFdAKEukBdkF8qCodJJbgUoS95x5QmwJm0K5bwrEWwNznmLYsTOdr8tJUfNoqO1C6lqu7CiblOhKUqDQm-58x2XttP6zXeVjXGZKoTqx1z1z5z4BvqNWpI</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Improved Collision Attack on MD4 with Probability Almost 1</title><source>Springer Books</source><creator>Naito, Yusuke ; Sasaki, Yu ; Kunihiro, Noboru ; Ohta, Kazuo</creator><contributor>Won, Dong Ho ; Kim, Seungjoo</contributor><creatorcontrib>Naito, Yusuke ; Sasaki, Yu ; Kunihiro, Noboru ; Ohta, Kazuo ; Won, Dong Ho ; Kim, Seungjoo</creatorcontrib><description>In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540333548</identifier><identifier>ISBN: 3540333541</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 354033355X</identifier><identifier>EISBN: 9783540333555</identifier><identifier>DOI: 10.1007/11734727_12</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Compression Function ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Exact sciences and technology ; Extra Condition ; Hash Function ; Information, signal and communications theory ; Input Message ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Success Probability ; Telecommunications and information theory</subject><ispartof>Information Security and Cryptology - ICISC 2005, 2006, p.129-145</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11734727_12$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11734727_12$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19689137$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Won, Dong Ho</contributor><contributor>Kim, Seungjoo</contributor><creatorcontrib>Naito, Yusuke</creatorcontrib><creatorcontrib>Sasaki, Yu</creatorcontrib><creatorcontrib>Kunihiro, Noboru</creatorcontrib><creatorcontrib>Ohta, Kazuo</creatorcontrib><title>Improved Collision Attack on MD4 with Probability Almost 1</title><title>Information Security and Cryptology - ICISC 2005</title><description>In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.</description><subject>Applied sciences</subject><subject>Compression Function</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Extra Condition</subject><subject>Hash Function</subject><subject>Information, signal and communications theory</subject><subject>Input Message</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Success Probability</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540333548</isbn><isbn>3540333541</isbn><isbn>354033355X</isbn><isbn>9783540333555</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAUhc1Loi2d-ANZGBgC9_oRx2xVeVUqggEktujaccE0raM4AvXfU1SQmM6RzqczfIydIlwggL5E1EJqrivke2wolAQhhFKv-2yABWIuhDQHbGx0-bfJ8pANQADPjZbimA1T-gAArg0fsKvZqu3ip6-zaWyakEJcZ5O-J7fMtu3hWmZfoX_PnrpoyYYm9Jts0qxi6jM8YUcLapIf_-aIvdzePE_v8_nj3Ww6mectR9PnUltvJVFdAKEukBdkF8qCodJJbgUoS95x5QmwJm0K5bwrEWwNznmLYsTOdr8tJUfNoqO1C6lqu7CiblOhKUqDQm-58x2XttP6zXeVjXGZKoTqx1z1z5z4BvqNWpI</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Naito, Yusuke</creator><creator>Sasaki, Yu</creator><creator>Kunihiro, Noboru</creator><creator>Ohta, Kazuo</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Improved Collision Attack on MD4 with Probability Almost 1</title><author>Naito, Yusuke ; Sasaki, Yu ; Kunihiro, Noboru ; Ohta, Kazuo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-47beb4aad60a176126abf5b09a8c42b305baec25ea01da7965cec810bd0cceb13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Compression Function</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Extra Condition</topic><topic>Hash Function</topic><topic>Information, signal and communications theory</topic><topic>Input Message</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Success Probability</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Naito, Yusuke</creatorcontrib><creatorcontrib>Sasaki, Yu</creatorcontrib><creatorcontrib>Kunihiro, Noboru</creatorcontrib><creatorcontrib>Ohta, Kazuo</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Naito, Yusuke</au><au>Sasaki, Yu</au><au>Kunihiro, Noboru</au><au>Ohta, Kazuo</au><au>Won, Dong Ho</au><au>Kim, Seungjoo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Improved Collision Attack on MD4 with Probability Almost 1</atitle><btitle>Information Security and Cryptology - ICISC 2005</btitle><date>2006</date><risdate>2006</risdate><spage>129</spage><epage>145</epage><pages>129-145</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540333548</isbn><isbn>3540333541</isbn><eisbn>354033355X</eisbn><eisbn>9783540333555</eisbn><abstract>In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang, Lai, Chen, and Yu. They claimed that collision messages were found with probability 2− 6 to 2− 2, and the complexity was less than 28 MD4 hash operations. However, there were some tyops and oversights in their paper. In this paper, first, we reevaluate the exact success probability. Second, we point out the typos and oversights in the paper of Wang et al, and we show how to improve them. Third, we propose a new message modification method for the third round of MD4. From the first result, we reevaluate that the method of Wang et al. can find collision messages with success probability 2− 5.61. From the second result, we can find collision messages with success probability 2− 2. Also by combining the second result and the third result, our improved method is able to find collision messages with probability almost 1. This complexity is less than 3 repetitions of MD4 hash operations. Our improved method is about 85 times as fast as the method of Wang et al.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11734727_12</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information Security and Cryptology - ICISC 2005, 2006, p.129-145
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19689137
source Springer Books
subjects Applied sciences
Compression Function
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Cryptography
Exact sciences and technology
Extra Condition
Hash Function
Information, signal and communications theory
Input Message
Memory and file management (including protection and security)
Memory organisation. Data processing
Signal and communications theory
Software
Success Probability
Telecommunications and information theory
title Improved Collision Attack on MD4 with Probability Almost 1
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T14%3A20%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Improved%20Collision%20Attack%20on%20MD4%20with%20Probability%20Almost%201&rft.btitle=Information%20Security%20and%20Cryptology%20-%20ICISC%202005&rft.au=Naito,%20Yusuke&rft.date=2006&rft.spage=129&rft.epage=145&rft.pages=129-145&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540333548&rft.isbn_list=3540333541&rft_id=info:doi/10.1007/11734727_12&rft_dat=%3Cpascalfrancis_sprin%3E19689137%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=354033355X&rft.eisbn_list=9783540333555&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true