메뉴 건너뛰기




Volumn 4964 LNCS, Issue , 2008, Pages 1-18

Security of MD5 challenge and response: Extension of APOP password recovery attack

Author keywords

APOP; Challenge and response; Collision attack; Hash function; MD5; Message difference; Password recovery

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEM RECOVERY; CRYPTOGRAPHY; MESSAGE PASSING; SECURITY SYSTEMS;

EID: 43149097854     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79263-5_1     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 1
    • 33746706791 scopus 로고    scopus 로고
    • Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 262-277. Springer, Heidelberg (2006)
    • Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 262-277. Springer, Heidelberg (2006)
  • 2
    • 84985796089 scopus 로고    scopus 로고
    • den Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
    • den Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
  • 3
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    • Lai, X, Chen, K, eds, ASlACRYPT 2006, Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASlACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 37-53
    • Contini, S.1    Yin, Y.L.2
  • 4
    • 43149100472 scopus 로고    scopus 로고
    • Hash Collisions (The Poisoned Message Attack) The Story of Alice and her Boss
    • Daum, M., Lucks, S.: Hash Collisions (The Poisoned Message Attack) The Story of Alice and her Boss. In: Eurocrypt 2005 (2005). http://th.informatik. uni-mannheim.de/people/lucks/HashCollisions/
    • (2005) Eurocrypt
    • Daum, M.1    Lucks, S.2
  • 5
    • 0342586737 scopus 로고    scopus 로고
    • Cryptanalysis of MD5 compress
    • Dobbertin, H.: Cryptanalysis of MD5 compress. In: Eyrocrypt 1996 (1996)
    • (1996) Eyrocrypt
    • Dobbertin, H.1
  • 8
    • 77952415887 scopus 로고    scopus 로고
    • Gebhardt, M., lilies, G., Schindler, W.: A note on the practical value of single hash collisions for special file formats. In: Dittmann, J. (ed.) Sicherheit, GI. LNI, 77, pp. 333-344 (2006)
    • Gebhardt, M., lilies, G., Schindler, W.: A note on the practical value of single hash collisions for special file formats. In: Dittmann, J. (ed.) Sicherheit, GI. LNI, vol. 77, pp. 333-344 (2006)
  • 9
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions: MD5 Collisions Within a Minute
    • Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report, /105. (2006), http://eprint.iacr.org/2006/ 105.pdf
    • (2006) Cryptology ePrint Archive, Report, /105
    • Klima, V.1
  • 10
    • 26444521554 scopus 로고    scopus 로고
    • Lenstra, A.K., de Weger, B.: On the possibility of constructing meaningful hash collisions for public keys. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 267-279. Springer. Heidelberg (2005)
    • Lenstra, A.K., de Weger, B.: On the possibility of constructing meaningful hash collisions for public keys. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 267-279. Springer. Heidelberg (2005)
  • 11
    • 38149073454 scopus 로고    scopus 로고
    • Leurent, G.: Message Freedom in MD4 and MD5 Collisions: Application to APOP. In: Biryukov. A. (ed.) FSE 2007. LNCS. 4593, pp. 309-328. Springer, Heidelberg (2007)
    • Leurent, G.: Message Freedom in MD4 and MD5 Collisions: Application to APOP. In: Biryukov. A. (ed.) FSE 2007. LNCS. vol. 4593, pp. 309-328. Springer, Heidelberg (2007)
  • 14
    • 43149087933 scopus 로고    scopus 로고
    • Myers, J, Rose, M, Post Office Protocol, Version 3. RFC 1939 Standard, May 1996. Updated by RFCs 1957, 2449
    • Myers, J., Rose, M.: Post Office Protocol - Version 3. RFC 1939 (Standard), May 1996. Updated by RFCs 1957, 2449, http://www.ietf.org/rfc/ rfc1939.txt
  • 15
    • 84947934697 scopus 로고    scopus 로고
    • On the Security of Two MAC Algorithms
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Preneel, B., van Oorschot, P.C.: On the Security of Two MAC Algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 19-32. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 19-32
    • Preneel, B.1    van Oorschot, P.C.2
  • 17
    • 43149121477 scopus 로고    scopus 로고
    • Sasaki, Y., Naito, Y., Kunihiro, N., Ohta, K.: Improved, collision attack on MD5. Cryptology ePrint Archive. Report 2005/400. http://eprint.iacr.org/ 2005/400
    • Sasaki, Y., Naito, Y., Kunihiro, N., Ohta, K.: Improved, collision attack on MD5. Cryptology ePrint Archive. Report 2005/400. http://eprint.iacr.org/ 2005/400
  • 19
    • 38149064346 scopus 로고    scopus 로고
    • Practical Password Recovery on an MD5 Challenge and Response. Cryptology ePrint Archive
    • Report 2007/101
    • Sasaki, Y., Yamamoto, G., Aoki, K.: Practical Password Recovery on an MD5 Challenge and Response. Cryptology ePrint Archive, Report 2007/101
    • Sasaki, Y.1    Yamamoto, G.2    Aoki, K.3
  • 20
    • 38049156019 scopus 로고    scopus 로고
    • Stevens, M., Lenstra, A., der Weger. B.: Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 1-12. Springer, Heidelberg (2007)
    • Stevens, M., Lenstra, A., der Weger. B.: Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1-12. Springer, Heidelberg (2007)
  • 21
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.