Fast collision attack on MD5

M Stevens - Cryptology EPrint Archive, 2006 - eprint.iacr.org
In this paper, we present an improved attack algorithm to find two-block collisions of the
hash function MD5. The attack uses the same differential path of MD5 and the set of …

[PDF][PDF] Attacks on hash functions and applications

M Stevens - Mathematical Institute, Faculty of …, 2012 - scholarlypublications …
P g.
N s. M …

Improved collision attack on hash function MD5

J Liang, XJ Lai - Journal of Computer Science and Technology, 2007 - Springer
In this paper, we present a fast attack algorithm to find two-block collision of hash function
MD5. The algorithm is based on the two-block collision differential path of MD5 that was …

Cryptographic hash functions: cryptanalysis, design and applications

P Gauravaram - 2007 - eprints.qut.edu.au
Cryptographic hash functions are an important tool in cryptography to achieve certain
security goals such as authenticity, digital signatures, digital time stam**, and entity …

A new authentication mechanism and key agreement protocol for sip using identity-based cryptography

J Ring, K Choo, E Foo, M Looi - Proceedings of the AusCERT …, 2006 - eprints.qut.edu.au
The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP
(VoIP) calls. IETF SIP standards do not specify a secure authentication process thus …

Reverse-engineering of the cryptanalytic attack used in the flame super-malware

M Fillinger, M Stevens - Advances in Cryptology–ASIACRYPT 2015: 21st …, 2015 - Springer
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting
the Middle-East. As it turned out, it used a forged signature to infect Windows machines by …

Single-block collision attack on MD5

M Stevens - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Abstract In 2010, Tao **e and Dengguo Feng [ePrint 2010/643] constructed the first single-
block collision for MD5 consisting of two 64-byte messages that have the same MD5 hash …

[PDF][PDF] Collision attacks on MD5 and SHA-1: Is this the “Sword of Damocles” for electronic commerce

P Gauravaram, A McCullagh, E Dawson - Information Security Institue (ISI) …, 2006 - Citeseer
Since Wang et al. announced their results regarding the susceptibility of MD5 (Crypto'04)
and SHA-1 (Crypto'05) hash functions to collision attacks, there have been many papers …

A new type of 2-block collisions in MD5

J Vábek, D Joščák, M Boháček, J Tůma - Progress in Cryptology …, 2008 - Springer
We present a new type of 2-block collisions for MD5. The colliding messages differ in words
m 2, m 9, m 12 in both blocks. The differential paths for the collisions were generated by our …

An improved collision attack on MD5 algorithm

S Chen, C ** - International Conference on Information Security and …, 2007 - Springer
The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology
nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions …