메뉴 건너뛰기




Volumn , Issue , 2011, Pages 427-434

On the security of digest access authentication

Author keywords

Access Authentication; Challenge and Response; Collision Attack; Hash Function; Password Recovery

Indexed keywords

ACCESS AUTHENTICATIONS; CHALLENGE AND RESPONSE; COLLISION ATTACK; COLLISION RESISTANCE; DATA ENCRYPTION; HTTP PROTOCOLS; OFF-LINE COMPUTATION; RECOVERY ATTACKS;

EID: 81455135959     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2011.79     Document Type: Conference Paper
Times cited : (10)

References (25)
  • 2
    • 81455130706 scopus 로고    scopus 로고
    • RFC 2831 (Proposed Standard), May [Online]. Available
    • P. Leach and C. Newman, "Using Digest Authentication as a SASL Mechanism," RFC 2831 (Proposed Standard), Internet Engineering Task Force, May 2000. [Online]. Available: http://www.ietf.org/rfc/rfc2831.txt
    • (2000) Using Digest Authentication As a SASL Mechanism
    • Leach, P.1    Newman, C.2
  • 3
    • 0342395900 scopus 로고    scopus 로고
    • RFC 2222 (Proposed Standard), Oct. obsoleted by RFCs 4422, 4752, updated by RFC 2444. [Online]. Available
    • J. Myers, "Simple Authentication and Security Layer (SASL)," RFC 2222 (Proposed Standard), Internet Engineering Task Force, Oct. 1997, obsoleted by RFCs 4422, 4752, updated by RFC 2444. [Online]. Available: http://www.ietf.org/rfc/rfc2222.txt
    • (1997) Simple Authentication and Security Layer (SASL)
    • Myers, J.1
  • 5
    • 0003602325 scopus 로고
    • RFC 1321 (Informational), Apr. updated by RFC 6151. [Online]. Available
    • R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1321 (Informational), Internet Engineering Task Force, Apr. 1992, updated by RFC 6151. [Online]. Available: http://www.ietf.org/rfc/rfc1321.txt
    • (1992) The MD5 Message-Digest Algorithm
    • Rivest, R.1
  • 6
    • 84947934697 scopus 로고    scopus 로고
    • On the Security of Two MAC Algorithms
    • Advances in Cryptology - EUROCRYPT 96, ser. U. Maurer, Ed. Springer Berlin / Heidelberg
    • B. Preneel and P. van Oorschot, "On the Security of Two MAC Algorithms," in Advances in Cryptology - EUROCRYPT 96, ser. Lecture Notes in Computer Science, U. Maurer, Ed. Springer Berlin / Heidelberg, 1996, vol. 1070, pp. 19-32.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 19-32
    • Preneel, B.1    Van Oorschot, P.2
  • 7
    • 24944575304 scopus 로고    scopus 로고
    • Crypt-analysis of the Hash Functions MD4 and RIPEMD
    • Advances in Cryptology - EUROCRYPT 2005, ser. R. Cramer, Ed. Springer Berlin / Heidelberg
    • X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu, "Crypt-analysis of the Hash Functions MD4 and RIPEMD," in Advances in Cryptology - EUROCRYPT 2005, ser. Lecture Notes in Computer Science, R. Cramer, Ed. Springer Berlin / Heidelberg, 2005, vol. 3494, pp. 551-551.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 551-551
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 8
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Advances in Cryptology - EUROCRYPT 2005, ser. R. Cramer, Ed. Springer Berlin / Heidelberg
    • X. Wang and H. Yu, "How to Break MD5 and Other Hash Functions," in Advances in Cryptology - EUROCRYPT 2005, ser. Lecture Notes in Computer Science, R. Cramer, Ed. Springer Berlin / Heidelberg, 2005, vol. 3494, pp. 561-561.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 561-561
    • Wang, X.1    Yu, H.2
  • 9
    • 33745171465 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1
    • Advances in Cryptology - CRYPTO 2005, ser. V. Shoup, Ed. Springer Berlin / Heidelberg
    • X. Wang, Y. Yin, and H. Yu, "Finding Collisions in the Full SHA-1," in Advances in Cryptology - CRYPTO 2005, ser. Lecture Notes in Computer Science, V. Shoup, Ed. Springer Berlin / Heidelberg, 2005, vol. 3621, pp. 17-36.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.2    Yu, H.3
  • 10
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions: MD5 Collisions Within a Minute
    • ePrint Archive, Report 2006/105
    • V. Klima, "Tunnels in Hash Functions: MD5 Collisions Within a Minute," Cryptology ePrint Archive, Report 2006/105, 2006, http://eprint.iacr.org/.
    • (2006) Cryptology
    • Klima, V.1
  • 11
    • 38149073454 scopus 로고    scopus 로고
    • Message Freedom in MD4 and MD5 Collisions: Application to APOP
    • Fast Software Encryption, ser. A. Biryukov, Ed. Springer Berlin / Heidelberg
    • G. Leurent, "Message Freedom in MD4 and MD5 Collisions: Application to APOP," in Fast Software Encryption, ser. Lecture Notes in Computer Science, A. Biryukov, Ed. Springer Berlin / Heidelberg, 2007, vol. 4593, pp. 309-328.
    • (2007) Lecture Notes in Computer Science , vol.4593 , pp. 309-328
    • Leurent, G.1
  • 12
    • 38149064346 scopus 로고    scopus 로고
    • Practical Password Recovery on an MD5 Challenge and Response
    • ePrint Archive, Report 2007/101
    • Y. Sasaki, G. Yamamoto, and K. Aoki, "Practical Password Recovery on an MD5 Challenge and Response," Cryptology ePrint Archive, Report 2007/101, 2007, http://eprint.iacr.org/.
    • (2007) Cryptology
    • Sasaki, Y.1    Yamamoto, G.2    Aoki, K.3
  • 13
    • 43149097854 scopus 로고    scopus 로고
    • Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
    • Topics in Cryptology - CT-RSA 2008, ser. T. Malkin, Ed. Springer Berlin / Heidelberg
    • Y. Sasaki, L. Wang, K. Ohta, and N. Kunihiro, "Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack," in Topics in Cryptology - CT-RSA 2008, ser. Lecture Notes in Computer Science, T. Malkin, Ed. Springer Berlin / Heidelberg, 2008, vol. 4964, pp. 1-18.
    • (2008) Lecture Notes in Computer Science , vol.4964 , pp. 1-18
    • Sasaki, Y.1    Wang, L.2    Ohta, K.3    Kunihiro, N.4
  • 14
    • 77951865221 scopus 로고    scopus 로고
    • Bit-Free Collision: Application to APOP Attack
    • Advances in Information and Computer Security, ser. T. Takagi and M. Mambo, Eds. Springer Berlin / Heidelberg
    • L. Wang, Y. Sasaki, K. Sakiyama, and K. Ohta, "Bit-Free Collision: Application to APOP Attack," in Advances in Information and Computer Security, ser. Lecture Notes in Computer Science, T. Takagi and M. Mambo, Eds. Springer Berlin / Heidelberg, 2009, vol. 5824, pp. 3-21.
    • (2009) Lecture Notes in Computer Science , vol.5824 , pp. 3-21
    • Wang, L.1    Sasaki, Y.2    Sakiyama, K.3    Ohta, K.4
  • 15
    • 81455157531 scopus 로고    scopus 로고
    • Fast Password Recovery Attack: Application to APOP
    • ePrint Archive, Report 2011/248
    • F. Liu, Y. Liu, T. Xie, and Y. Feng, "Fast Password Recovery Attack: Application to APOP," Cryptology ePrint Archive, Report 2011/248, 2011, http://eprint.iacr.org/.
    • (2011) Cryptology
    • Liu, F.1    Liu, Y.2    Xie, T.3    Feng, Y.4
  • 17
    • 84979021449 scopus 로고    scopus 로고
    • Cryptographic Primitives for Information Authentication - State of the Art
    • State of the Art in Applied Cryptography, ser. Springer Berlin / Heidelberg
    • B. Preneel, "Cryptographic Primitives for Information Authentication - State of the Art," in State of the Art in Applied Cryptography, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 1998, vol. 1528, pp. 49-104.
    • (1998) Lecture Notes in Computer Science , vol.1528 , pp. 49-104
    • Preneel, B.1
  • 18
    • 84985796089 scopus 로고
    • Collisions for the compression function of MD5
    • Advances in Cryptology - EUROCRYPT 93, ser. T. Helleseth, Ed. Springer Berlin / Heidelberg
    • B. den Boer and A. Bosselaers, "Collisions for the compression function of MD5," in Advances in Cryptology - EUROCRYPT 93, ser. Lecture Notes in Computer Science, T. Helleseth, Ed. Springer Berlin / Heidelberg, 1994, vol. 765, pp. 293-304.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 293-304
    • Den Boer, B.1    Bosselaers, A.2
  • 19
    • 58549103197 scopus 로고    scopus 로고
    • Master's thesis, TU Eindhoven, Faculty of Mathematics and Computer Science
    • M. Stevens, "On Collisions for MD5," Master's thesis, TU Eindhoven, Faculty of Mathematics and Computer Science, 2007.
    • (2007) On Collisions for MD5
    • Stevens, M.1
  • 20
    • 70350346082 scopus 로고    scopus 로고
    • Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
    • Advances in Cryptology - CRYPTO 2009, ser. S. Halevi, Ed. Springer Berlin / Heidelberg
    • M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. Osvik, and B. de Weger, "Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate," in Advances in Cryptology - CRYPTO 2009, ser. Lecture Notes in Computer Science, S. Halevi, Ed. Springer Berlin / Heidelberg, 2009, vol. 5677, pp. 55-69.
    • (2009) Lecture Notes in Computer Science , vol.5677 , pp. 55-69
    • Stevens, M.1    Sotirov, A.2    Appelbaum, J.3    Lenstra, A.4    Molnar, D.5    Osvik, D.6    De Weger, B.7
  • 21
    • 56549094743 scopus 로고    scopus 로고
    • A New Collision Differential for MD5 with Its Full Differential Path
    • ePrint Archive, Report 2008/230
    • T. Xie, D. Feng, and F. Liu, "A New Collision Differential For MD5 With Its Full Differential Path," Cryptology ePrint Archive, Report 2008/230, 2008, http://eprint.iacr.org/.
    • (2008) Cryptology
    • Xie, T.1    Feng, D.2    Liu, F.3
  • 22
    • 81455130707 scopus 로고    scopus 로고
    • Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? the poster session of EUROCRYPT 2009. Cryptology ePrint Archive, Report 2008/391
    • T. Xie, F. Liu, and D. Feng, "Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?" LNCS 5479, the poster session of EUROCRYPT 2009. Cryptology ePrint Archive, Report 2008/391, 2008, http://eprint.iacr.org/.
    • (2008) LNCS , vol.5479
    • Xie, T.1    Liu, F.2    Feng, D.3
  • 23
    • 80051762753 scopus 로고    scopus 로고
    • How to Find Weak Input Differences for MD5 Collision Attacks
    • ePrint Archive, Report 2009/223
    • T. Xie and D. Feng, "How To Find Weak Input Differences For MD5 Collision Attacks," Cryptology ePrint Archive, Report 2009/223, 2009, http://eprint.iacr.org/.
    • (2009) Cryptology
    • Xie, T.1    Feng, D.2
  • 24
    • 81455157535 scopus 로고    scopus 로고
    • Construct MD5 Collisions Using Just A Single Block of Message
    • ePrint Archive, Report 2010/643
    • -, "Construct MD5 Collisions Using Just A Single Block Of Message," Cryptology ePrint Archive, Report 2010/643, 2010, http://eprint.iacr.org/.
    • (2010) Cryptology
    • Xie, T.1    Feng, D.2
  • 25
    • 81455157533 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • vol. In Press, Corrected Proof, pp.
    • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,"Journal of Network and Computer Applications, vol. In Press, Corrected Proof, pp. -, 2011.
    • (2011) Journal of Network and Computer Applications
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.