Computer Science ›› 2017, Vol. 44 ›› Issue (9): 168-171.doi: 10.11896/j.issn.1002-137X.2017.09.032

Previous Articles     Next Articles

Improved Meaningful Collision Attack on MD4

ZHOU Yong-peng and WANG Gao-li   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In FSE’1996,Hans Dobbertin gave a meaningful collision on MD4 based on ASCII,which contains meaningless words at the beginning of the text.In 2009,Jia and Wang presented a meaningful collision on MD4 based on Latin-1character set,which contains meaningless words at the end of the text.In this paper,based on the modular differential method proposed by Wang,we gave two concrete meaningful collisions by using the differential characteristic proposed by Yu et al.in CANS 2005.One example of the meaningful collision is in Chinese and based on GBK,an other example is in English and based on UTF-8.Moreover,an example of tampered python script was proposed.

Key words: MD4 algorithm,Modular differential cryptanalysis,Meaningful collision,GBK,UTF-8

[1] RIVEST R L.The MD4 message-digest algorithm[C]∥ CPYPTO1990.LNCS,1990:303-312.
[2] BOER B D,BOSSELAERS A.An attack on the last two rounds of MD4[C]∥CRYPTO 1991.LNCS 576,1991:194-203.
[3] VAUDENAY S.On the need for multipermutations:Cryptanalsis of MD4 and SAFER[C]∥FSE 1995.LNCS 1008,1995:286-297.
[4] DOBBERTIN H.Cryptanalysis of MD4[J].Journal of Cryptology,1998,11(4):253-271.
[5] WANG X,FENG D,LAI X,et al.Collisions for hash functions MD4,MD5,HAVAL-128 and RIPEMD.http://eprint.iacr.org/2004/199.pdf.
[6] WANG X,YU H.How to break MD5 and other hash functions[C]∥EUROCRYPT 2005,LNCS.2005:19-35.
[7] WANG X,YIN Y L,YU H.Finding Collisions in the Full SHA-1[C]∥International Cryptology Conference on Advances in Cryptology-CRYPTO.Springer-Verlag,2005:17-36.
[8] YU H B,WANG G L,ZHANG G Y,et al.The Second-Prei-mage Attack on MD4[C]∥CANS 2005.LNCS 3810,2005:1-12.
[9] JIA K,WANG X.Meaningful Collision Attack on MD4[J].Journal of Frontiers of Computer Science & Technology,2010,3:202-213.
[10] BAI D X.Safety analysis of some block cipher and hash function[D].Beijing:Tsinghua University,2015.(in Chinese) 白东霞.几个分组密码和杂凑函数的安全性分析[D].北京:清华大学,2015.
[11] LANDELLE F,PEYRIN T.Cryptanalysis of Full RIPEMD-128[J].Journal of Cryptology,2015,7881:1-25.
[12] CHENG K,HAN W B.Automatic construction algorithm ofMD4 differential path [J].Journal of Information Engineering University,2014,15(2):129-133.(in Chinese) 程宽,韩文报.MD4差分路径的自动化构造算法[J].信息工程大学学报,2014,15(2):129-133.
[13] WANG G L.Collision Attack on the Full Extended MD4 andPseudo-Preimage Attack on RIPEMD[J].Journal of Computer Science and Technology,2013,28(1):129-143.
[14] LI Q,TANG B,YANG J.Key Technology Research for Content Supervision Based on KAD Network[C]∥International Confe-rence on Multimedia & Image Processing.IEEE Computer So-ciety,2016:72-77.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!