DOI: 10.1007/978-3-540-71039-4_26
|View full text |Cite
|
Sign up to set email alerts
|

MD4 is Not One-Way

Abstract: Abstract. MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash functions (MD5, SHA-1, SHA-2) are based on the design principles of MD4. MD4 has been extensively studied and very efficient collision attacks are known, but it is still believed to be a one-way function.In this paper we show a partial pseudo-preimage attack on the compression function of MD4, using some ideas from previous cryptanalysis of MD4. We can choose 64 bits of the output f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
74
0

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(74 citation statements)
references
References 21 publications
0
74
0
Order By: Relevance
“…After Saarinen [11] and Leurent [12] showed examples of meet-in-the-middle preimage attacks, the techniques for such preimage attacks have been developed very rapidly. Attacks based on the concept of meet-in-the-middle have been reported for various hash functions, for example MD5 [13], SHA-1, HAVAL [14], and so on [15,16,17,18].…”
Section: Introductionmentioning
confidence: 99%
“…After Saarinen [11] and Leurent [12] showed examples of meet-in-the-middle preimage attacks, the techniques for such preimage attacks have been developed very rapidly. Attacks based on the concept of meet-in-the-middle have been reported for various hash functions, for example MD5 [13], SHA-1, HAVAL [14], and so on [15,16,17,18].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, it is possible to improve the algorithm further by building a layered hash tree, similar to the one used in [10]. The optimized algorithm yields a less marginal improvement factor of 2 9 = 512 over exhaustive search, which is about 20 times better than the attack published by Thomas Fuhr [2].…”
Section: Using Pseudo Preimages To Obtain Second Preimages For Hamsi-256mentioning
confidence: 99%
“…It uses the layered hash tree construction, as described in [10]: We start by selecting the root of the tree from the chaining values that are generated during the computation of the hash of the message. We then find a pseudo preimage of the root and add it to the tree.…”
Section: E Appendix: Details Of the Improved Short Messagementioning
confidence: 99%
“…The attack, with a complexity of 2 100. 5 , generates a preimage [9]. The first preimage attack on MD5 was presented by De et al in 2007.…”
Section: History Of Preimage Attacks On Md4-familymentioning
confidence: 99%