Computer Science ›› 2009, Vol. 36 ›› Issue (11): 106-108.
Previous Articles Next Articles
MAO Ming, CHEN Shao-hui,YUAN Zheng,JIA Yong-xing
Online:
Published:
Abstract: This paper is about the cryptanalysis of the Hash function MD5,on the basis of the paper concerning the breaking the MD5 which was written by Wang et al. In this paper, the eighth step of MD5 algorithm was taken for example and the properties of the F function and the effective control of the differential path were introduced. The MD5 algorithm was cryptanalyzed from both the manual calculation and the testing program and some part of the paper written by Wang was amended. Finally, the conditions and key points of meeting the differential characteristics were discussed. In general, this paper plays an important role in cryptanalyzing and breaking the MD5 algorithm.
Key words: MD5,Differential control,Hash function, Cryptanalysis
MAO Ming, CHEN Shao-hui,YUAN Zheng,JIA Yong-xing. Cryptanalysis of the Hash Function MD5[J].Computer Science, 2009, 36(11): 106-108.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I11/106
Cited