Construction of the Initial Structure for Preimage Attack of MD5
@article{Mao2009ConstructionOT, title={Construction of the Initial Structure for Preimage Attack of MD5}, author={Ming Mao and Shaohui Chen and J. Xu}, journal={2009 International Conference on Computational Intelligence and Security}, year={2009}, volume={1}, pages={442-445} }
The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule” technique, the successful possibility of the construction is higher than 2-32 . Our construction is based on the MD5 structure, the message modification technique which is improved from Wang’ s. Some related techniques such as the extential form of the signed difference and special role of MSB are applied. According to Sasaki’ s thought, the initial structure… CONTINUE READING
Figures and Topics from this paper
Figures
4 Citations
C-A1-01: Using Data Transformations, Derived Values, and Cryptographic Functions to Protect PHI in the VDW
- Computer Science
- Clinical Medicine & Research
- 2011
- PDF
References
SHOWING 1-10 OF 15 REFERENCES
Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Computer Science
- EUROCRYPT
- 2009
- 190
- Highly Influential
- PDF
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Computer Science
- Selected Areas in Cryptography
- 2008
- 147
- PDF
How to Break MD5 and Other Hash Functions
- Computer Science, Mathematics
- EUROCRYPT
- 2005
- 1,484
- Highly Influential
- PDF
A New Differential for MD5 With Its Full Differential Path
- Journal of Computer Science andTechnology . Jan .
- 2008