메뉴 건너뛰기




Volumn 4593 LNCS, Issue , 2007, Pages 309-328

Message freedom in MD4 and MD5 collisions: Application to APOP

Author keywords

APOP security; Hash function; MD4; MD5; Meaningful collisions; Message modification

Indexed keywords

AUTHENTICATION; COLLISION AVOIDANCE; SECURITY OF DATA;

EID: 38149073454     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74619-5_20     Document Type: Conference Paper
Times cited : (22)

References (25)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-Collisions of SHA-O
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Biham, E., Chen, R.: Near-Collisions of SHA-O. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 33746706791 scopus 로고    scopus 로고
    • Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 262-277. Springer, Heidelberg (2006)
    • Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 262-277. Springer, Heidelberg (2006)
  • 3
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284
    • Contini, S.1    Yin, Y.L.2
  • 4
    • 38049111724 scopus 로고    scopus 로고
    • EUROCRYPT 2005
    • Cramer, R.J.F, ed, Springer, Heidelberg
    • Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494
  • 6
    • 38149099120 scopus 로고    scopus 로고
    • Daum, M., Lucks, S.: Hash Collisions (The Poisoned Message Attack) The Story of Alice and her Boss. Presented at the rump session of Eurocrypt '05. http://th.informatik.unl-marinheim.de/people/lucks/ HashCollisions/
    • Daum, M., Lucks, S.: Hash Collisions (The Poisoned Message Attack) "The Story of Alice and her Boss". Presented at the rump session of Eurocrypt '05. http://th.informatik.unl-marinheim.de/people/lucks/ HashCollisions/
  • 7
    • 0005268716 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Dobbertin, H.: Cryptanalysis of MD4. J. Cryptology 11(4), 253-271 (1998)
    • (1998) J. Cryptology , vol.11 , Issue.4 , pp. 253-271
    • Dobbertin, H.1
  • 8
    • 77952415887 scopus 로고    scopus 로고
    • Gebhardt, M., Iilies, G., Schindler, W.: A Note on the Practical Value of Single Hash Collisions for Special File Formats.In: Dittmann, J. (ed.) Sicherheit, 77 of LNI, pp. 333-344. GI (2006)
    • Gebhardt, M., Iilies, G., Schindler, W.: A Note on the Practical Value of Single Hash Collisions for Special File Formats.In: Dittmann, J. (ed.) Sicherheit, vol. 77 of LNI, pp. 333-344. GI (2006)
  • 9
    • 33750029023 scopus 로고    scopus 로고
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
  • 10
    • 33746036727 scopus 로고    scopus 로고
    • Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications. Cryptology ePrint Archive
    • Report 2005/102
    • Klima, V.: Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications. Cryptology ePrint Archive, Report 2005/102 (2005), http ://eprint.iacr.org/
    • (2005)
    • Klima, V.1
  • 11
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive
    • Report 2006/105
    • Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
    • (2006)
    • Klima, V.1
  • 12
    • 26444521554 scopus 로고    scopus 로고
    • Lenstra, A.K., Weger, B.d.: On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 267-279. Springer, Heidelberg (2005)
    • Lenstra, A.K., Weger, B.d.: On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 267-279. Springer, Heidelberg (2005)
  • 13
    • 38149040776 scopus 로고    scopus 로고
    • Myers, J, Rose, M, Post Office Protocol, Version 3. RFC 1939 (Standard, May 1996) Updated by RFCs 1957, 2449
    • Myers, J., Rose, M.: Post Office Protocol - Version 3. RFC 1939 (Standard) (May 1996) Updated by RFCs 1957, 2449.
  • 14
    • 33745822369 scopus 로고    scopus 로고
    • Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4 with Probability Almost 1. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, 3935, pp. 129-145. Springer, Heidelberg (2006)
    • Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4 with Probability Almost 1. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 129-145. Springer, Heidelberg (2006)
  • 15
    • 84947934697 scopus 로고    scopus 로고
    • Preneel, B., van Oorschot, P.C.: On the Security of Two MAC Algorithms. In: EUROCRYPT, pp. 19-32 (1996)
    • Preneel, B., van Oorschot, P.C.: On the Security of Two MAC Algorithms. In: EUROCRYPT, pp. 19-32 (1996)
  • 16
    • 38149064346 scopus 로고    scopus 로고
    • Practical password recovery on an md5 challenge and response. Cryptology ePrint Archive
    • Report 2007/101
    • Sasaki, Y., Yamamoto, G., Aoki, K.: Practical password recovery on an md5 challenge and response. Cryptology ePrint Archive, Report 2007/101(2007), http://eprint.iacr.org/
    • (2007)
    • Sasaki, Y.1    Yamamoto, G.2    Aoki, K.3
  • 17
    • 38149141484 scopus 로고    scopus 로고
    • CRYPTO 2005
    • Shoup, V, ed, Springer, Heidelberg
    • Shoup, V. (ed.): CRYPTO 2005. LNCS, vol. 3621, pp. 14-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 14-18
  • 18
    • 38149060942 scopus 로고    scopus 로고
    • Fast Collision Attack on MD5. Cryptology ePrint Archive
    • Report 2006/104
    • Stevens, M.: Fast Collision Attack on MD5. Cryptology ePrint Archive, Report 2006/104 (2006), http://eprint.iacr.org/
    • (2006)
    • Stevens, M.1
  • 19
    • 38149102293 scopus 로고    scopus 로고
    • Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Cryptology ePrint Archive
    • Report 2006/360
    • Stevens, M., Lenstra, A., de Weger, B.: Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Cryptology ePrint Archive, Report 2006/360 (2006), http://eprint.iacr.org/
    • (2006)
    • Stevens, M.1    Lenstra, A.2    de Weger, B.3
  • 20
    • 33745677802 scopus 로고    scopus 로고
    • Szydlo, M., Yin, Y.L.: Collision-Resistant Usage of MD5 and SHA-I Via Message Preprocessing. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 99-114. Springer, Heidelberg (2006)
    • Szydlo, M., Yin, Y.L.: Collision-Resistant Usage of MD5 and SHA-I Via Message Preprocessing. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 99-114. Springer, Heidelberg (2006)
  • 22
    • 38149118788 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-I. In: Shoup [17], pp. 17-36 (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-I. In: Shoup [17], pp. 17-36 (2005)
  • 24
    • 38149048320 scopus 로고    scopus 로고
    • Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-O. In: Shoup [17], pp. 1-16 (2005)
    • Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-O. In: Shoup [17], pp. 1-16 (2005)
  • 25
    • 33744827107 scopus 로고    scopus 로고
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 1-12. Springer, Heidelberg (2005)
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.