Cryptanalysis of MD2

@article{Knudsen2009CryptanalysisOM,
  title={Cryptanalysis of MD2},
  author={L. Knudsen and John Erik Mathiassen and F. Muller and S{\o}ren S. Thomsen},
  journal={Journal of Cryptology},
  year={2009},
  volume={23},
  pages={72-90}
}
This paper considers the hash function MD2 which was developed by Ron Rivest in 1989. Despite its age, MD2 has withstood cryptanalytic attacks until recently. This paper contains the state-of-the-art cryptanalytic results on MD2, in particular collision and preimage attacks on the full hash function, the latter having complexity 273, which should be compared to a brute-force attack of complexity 2128. 
16 Citations
Towards Designing Greener Secured Hash Functions
  • Priyanka D. Harish, S. Roy
  • Computer Science
  • 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom)
  • 2014
  • 1
On Resilient Password-Based Key Derivation Functions
  • PDF
Second-Preimage Analysis of Reduced SHA-1
  • 10
  • PDF
On hash functions using checksums
  • 21
  • PDF
Neutrality-Based Symmetric Cryptanalysis
  • 3
Cryptography in Blockchain
  • 3
...
1
2
...

References

SHOWING 1-10 OF 89 REFERENCES
The MD2 Hash Function Is Not One-Way
  • 33
  • PDF
Cryptanalysis of MD4
  • H. Dobbertin
  • Mathematics, Computer Science
  • Journal of Cryptology
  • 1998
  • 165
  • PDF
Cryptanalysis of reduced version of HAVAL
  • 17
Differential Collisions in SHA-0
  • 300
  • PDF
Preimage and Collision Attacks on MD2
  • 28
  • PDF
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
  • 540
  • PDF
Design Principles for Iterated Hash Functions
  • S. Lucks
  • Computer Science, Mathematics
  • IACR Cryptol. ePrint Arch.
  • 2004
  • 99
  • PDF
On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
  • 170
  • PDF
Weaknesses in the HAS-V Compression Function
  • 25
  • PDF
Cryptanalysis of 3-Pass HAVAL
  • 36
  • PDF
...
1
2
3
4
5
...