首页> 外文会议>Selected areas in cryptography : Revised selected papers >Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
【24h】

Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5

机译:3通道HAVAL和阶跃降低的MD5的原像攻击

获取原文
获取原文并翻译 | 示例

摘要

This paper presents preimage attacks on the hash functions 3-pass HAVAL and step-reduced MD5. Introduced in 1992 and 1991 respectively, these functions underwent severe collision attacks, but no preimage attack. We describe two preimage attacks on the compression function of 3-pass HAVAL. The attacks have a complexity of about 2~(224) compression function evaluations instead of 2~(256). We present several preimage attacks on the MD5 compression function that invert up to 47 steps (out of 64) within 2~(96) trials instead of 2~(128). Although our attacks are not practical, they show that the security margin of 3-pass HAVAL and step-reduced MD5 with respect to preimage attacks is not as high as expected.
机译:本文介绍了对散列函数3-pass HAVAL和逐步降低的MD5的原像攻击。这些功能分别于1992年和1991年推出,经历了严重的碰撞攻击,但没有发生原像攻击。我们描述了三遍HAVAL压缩功能的两种原像攻击。攻击的复杂度约为2〜(224)个压缩函数评估,而不是2〜(256)。我们提出了几种针对MD5压缩功能的原像攻击,这些攻击在2〜(96)次试验中(而不是2〜(128)次)中最多反转了47个步骤(共64个步骤)。尽管我们的攻击不切实际,但它们表明,针对原像攻击的3遍HAVAL和递减的MD5的安全裕度没有预期的高。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号