메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 121-133

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC

Author keywords

Distinguishing attack; HMAC; Key recovery; MD5; MDx MAC; NMAC

Indexed keywords

DISTINGUISHING ATTACK; HMAC; KEY RECOVERY; MD5; MDX-MAC; NMAC;

EID: 67650667840     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_7     Document Type: Conference Paper
Times cited : (24)

References (20)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Advances in Cryptology - CRYPTO '96
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.1109, pp. 1-15. Springer, Heidelberg (1996) (Pubitemid 126106226)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 35048892549 scopus 로고    scopus 로고
    • Near-collisions of SHA-0
    • In: Franklin, M. (ed.), LNCS Springer, Heidelberg
    • Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 290-305. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004 , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 4
    • 24944584156 scopus 로고    scopus 로고
    • Collisions of SHA-0 and reduced SHA-1
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and reduced SHA-1. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 36-57. Springer, Heidelberg (2005) (Pubitemid 41313945)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 36-57
    • Biham, E.1    Chen, R.2    Joux, A.3    Carribault, P.4    Lemuet, C.5    Jalby, W.6
  • 5
    • 84985796089 scopus 로고
    • Collisions for the compression function of MD5
    • In: Helleseth, T. (ed.) LNCS Springer, Heidelberg
    • Den Boer, B., Bosselaers, A.: Collisions for the compression function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.765, pp. 293-304. Springer, Heidelberg (1994)
    • (1994) EUROCRYPT 1993 , vol.765 , pp. 293-304
    • Den Boer, B.1    Bosselaers, A.2
  • 6
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    • In: Lai, X., Chen, K. (eds.) LNCS Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 37-53. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006 , vol.4284 , pp. 37-53
    • Contini, S.1    Yin, Y.L.2
  • 7
    • 38149058225 scopus 로고    scopus 로고
    • Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
    • In: Menezes, A. (ed.) LNCS Springer, Heidelberg
    • Fouque, P.-A., Leurent, G., Nguyen, P.Q.: Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 13-30. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007 , vol.4622 , pp. 13-30
    • Fouque, P.-A.1    Leurent, G.2    Nguyen, P.Q.3
  • 10
    • 51549120471 scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • In: Coppersmith, D. (ed.) LNCS, Springer, Heidelberg
    • Preneel, B., Van Oorschot, P.: MDx-MAC and building fast MACs from hash functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.963, pp. 1-14. Springer, Heidelberg (1995)
    • (1995) CRYPTO 1995 , vol.963 , pp. 1-14
    • Preneel, B.1    Van Oorschot, P.2
  • 12
    • 44349165814 scopus 로고    scopus 로고
    • New results on NMAC/HMAC when instantiated with popular hash functions
    • Rechberger, C., Rijmen, V.: New results on NMAC/HMAC when instantiated with popular hash functions. Journal of Universal Computer Science 14(3), 347-376 (2008)
    • (2008) Journal of Universal Computer Science , vol.14 , Issue.3 , pp. 347-376
    • Rechberger, C.1    Rijmen, V.2
  • 13
    • 0003195066 scopus 로고
    • The MD5 message digest algorithm
    • Network Working Group
    • Rivest, R.L.: The MD5 message digest algorithm. Request for Comments (RFC 1321), Network Working Group (1992)
    • (1992) Request for Comments (RFC 1321)
    • Rivest, R.L.1
  • 14
    • 0347506735 scopus 로고
    • Message authentication with one-way hash functions
    • Tsudik, G.: Message authentication with one-way hash functions. ACM Comput. Commun. Rev. 22(5), 29-38 (1992)
    • (1992) ACM Comput. Commun. Rev. , vol.22 , Issue.5 , pp. 29-38
    • Tsudik, G.1
  • 16
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 1-18. Springer, Heidelberg (2005) (Pubitemid 41313943)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 17
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 18
    • 33646748234 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA-0
    • In: Shoup, V. (ed.), LNCS, Springer, Heidelberg
    • Wang, X., Yu, H., Yin, Y.L.: Efficient collision search attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 1-16. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005 , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, Y.L.3
  • 20
    • 74549196057 scopus 로고
    • How to swindle rabin
    • Yuval, G.: How to swindle rabin. Cryptologia 3, 187-190 (1979)
    • (1979) Cryptologia 3 , pp. 187-190
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.