计算机科学 ›› 2009, Vol. 36 ›› Issue (11): 106-108.

• 计算机网络与信息安全 • 上一篇    下一篇

关于Hash函数MD5的解析

毛明,陈少晖,袁征,贾永兴   

  1. (西安电子科技大学通信工程学院 西安710071);(北京电子科技学院信息安全系 北京100070);(清华大学高等研究中心 北京100084)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家973计划(编号:2007CB807902),中国博士后科学基金资助项目(编号:20080430423)资助。

Cryptanalysis of the Hash Function MD5

MAO Ming, CHEN Shao-hui,YUAN Zheng,JIA Yong-xing   

  • Online:2018-11-16 Published:2018-11-16

摘要: 在王小云写的关于分析MD5算法文章的基础上,对MD5算法的破译进行进一步的解析。以MD5算法第八步为例,介绍了F函数的性质和差分路径的有效控制。从手工推算和程序实现两方面对MD5算法进行了解析和测试,对王的文章进行了部分修正,进一步说明了满足差分特征的条件和关键点。这对MD5和其他Hash函数的分析破译有着重要的作用。

关键词: MD5,差分控制,Hash函数,解析

Abstract: This paper is about the cryptanalysis of the Hash function MD5,on the basis of the paper concerning the breaking the MD5 which was written by Wang et al. In this paper, the eighth step of MD5 algorithm was taken for example and the properties of the F function and the effective control of the differential path were introduced. The MD5 algorithm was cryptanalyzed from both the manual calculation and the testing program and some part of the paper written by Wang was amended. Finally, the conditions and key points of meeting the differential characteristics were discussed. In general, this paper plays an important role in cryptanalyzing and breaking the MD5 algorithm.

Key words: MD5,Differential control,Hash function, Cryptanalysis

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!