2007
DOI: 10.1007/978-3-540-72540-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities

Abstract: Abstract. We present a novel, automated way to find differential paths for MD5. As an application we have shown how, at an approximate expected cost of 2 50 calls to the MD5 compression function, for any two chosen message prefixes P and P , suffixes S and S can be constructed such that the concatenated values P S and P S collide under MD5. Although the practical attack potential of this construction of chosen-prefix collisions is limited, it is of greater concern than random collisions for MD5. To illustrate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
96
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 128 publications
(97 citation statements)
references
References 8 publications
0
96
0
1
Order By: Relevance
“…We describe, roughly, what was achieved in the Eurocrypt 2007 paper [13] and why those methods were believed to have limited impact. Given any two chosen message prefixes P and P , it was shown how suffixes S and S can be constructed such that the concatenations P S and P S collide under MD5.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…We describe, roughly, what was achieved in the Eurocrypt 2007 paper [13] and why those methods were believed to have limited impact. Given any two chosen message prefixes P and P , it was shown how suffixes S and S can be constructed such that the concatenations P S and P S collide under MD5.…”
Section: Introductionmentioning
confidence: 99%
“…[13]). Actual realization of the threat in question was considered to be hard due to a combination of difficulties, some related to the construction, others to the way certificates are produced by CAs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Prominent and widely deployed hash functions such as MD5 [38], SHA-1 [37], and the SHA-2 family [37] are used in various products and implementations whose security depends on the collision resistance of those hash functions. However, over the last years (chosen-prefix) collision attacks have been published for MD5 [42] [43] and SHA-1 [30] and are already exploited in the real-world. Recently, a major attack based on MD5 collisions was performed by the Flame espionage malware which injects itself into the Microsoft Windows operating system.…”
Section: Introductionmentioning
confidence: 99%
“…MD5 had been known to be insecure since at least 1996, with a regular stream of findings against the algorithm, punctuated in particular by the generation of MD5 collisions in 2004 [20] and the extension of these attacks to chosen prefix attacks in 2007 [14]. Stevens and Sotirov demonstrated a real-world application of the chosen-prefix attack by finding a CA, RapidSSL, that used MD5 and generated entirely predictable certificates (in particular, the Serial Number and Signing/Expiration time fields) and giving it a PKCS#10 request that forced it to generate a certificate that had the same MD5 hash as an intermediate certificate they had already generated.…”
Section: Introductionmentioning
confidence: 99%