Tunnels in Hash Functions: MD5 Collisions Within a Minute

  title={Tunnels in Hash Functions: MD5 Collisions Within a Minute},
  author={Vlastimil Kl{\'i}ma},
  journal={IACR Cryptology ePrint Archive},
In this paper we introduce a new idea of tunneling of hash functions. In some sense tunnels replace multi-message modification methods and exponentially accelerate collision search. We describe several tunnels in hash function MD5. Using it we find a MD5 collision roughly in one minute on a standard notebook PC (Intel Pentium, 1.6 GHz). The method works for any initializing value. Tunneling is a general idea, which can be used for finding collisions of other hash functions, such as SHA-1, 2. We… CONTINUE READING
Highly Influential
This paper has highly influenced 16 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS

From This Paper

Figures, tables, and topics from this paper.
82 Citations
6 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 82 extracted citations

Similar Papers

Loading similar papers…