• Corpus ID: 5752727

Message Authentication with MD 5 *

  title={Message Authentication with MD 5 *},
  author={Burton S. Kaliski and Matthew J. B. Robshaw},
But how to do it? Hash functions are intended to resist inversion —finding a message with a given hash value — and collision — finding two messages with the same hash value. Message authentication codes, on the other hand, are intended to resist forgery — computing a message authentication code without knowledge of a secret key. Building a message authentication code on an encryption function thus seems a logical choice (and the security relationship has been recently settled — in work by Mihir… 

Figures from this paper

Practical Password Recovery on an MD5 Challenge and Response
The Wang’s attack is utilized to make collisions in MD5, and it is confirmed that the first 3 octets of secret key can be recovered by several hundred queries under the man-in-the-middle environment.
Impersonation with the Echo Protocol
An impersonation attack against the Echo protocol based on this weakness is described and a couple of approaches which can be used to defend against the attack are described.
Cloud Data Auditing Techniques with a Focus on Privacy and Security
A review of the state of the art and research in cloud data auditing techniques highlights integrity and privacy challenges, current solutions, and future research directions.
Security analysis of an agent-mediated book trading application
This paper presents a security analysis of an agent mediated application in an open distributed environment. We use a case study of a booktrading application that we implemented using AgentScape and


Message authentication with one-way hash functions
This brief paper introduces encryption-free message authentication based entirely on fast one-way hash functions and two methods are presented and their strength is analyzed.
The Security of Cipher Block Chaining
This work provides its first formal justification, showing the following general lemma: that cipher block chaining a pseudorandom function gives a Pseudo-Cipher Block Chaining function.
One Way Hash Functions and DES
This work shows three one-way hash functions which are secure if DES is a good random block cipher.
A Design Principle for Hash Functions
Apart from suggesting a generally sound design principle for hash functions, the results give a unified view of several apparently unrelated constructions of hash functions proposed earlier, and suggests changes to other proposed constructions to make a proof of security potentially easier.
The MD5 Message-Digest Algorithm
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)
It is the purpose of this document, Security Protocols for SNMPv2, to define one such authentication and one such privacy protocol. [STANDARDS-TRACK]
RFC 1321: The MD5 Message-Digest Algorithm
  • RFC 1321: The MD5 Message-Digest Algorithm
  • 1992
Keying MD5 -Message authentication via iterated pseudorandomness
  • Keying MD5 -Message authentication via iterated pseudorandomness
XOR MACs: New methods for message authentication using block ciphers
  • XOR MACs: New methods for message authentication using block ciphers