The Research of Key Technology in Breaking MD5 Hashing Function
Date Issued
2009
Date
2009
Author(s)
Chen, Chih-Shun
Abstract
Hash functions are used to compress variable-length message into a fix-length message digest, similar to finger-print, for the purpose of verifying the original message is changed or not and preventing denied by sender or receiver. Hash functions have been applied in digital signature, message authentication, electrical commercial, on-line financial transaction, password and so on.owadays the most well-known hash functions are MD5 and SHA-1 which both are ANSI-standards. Professor Xiaoyun Wang of Shandong University, China announced report of breaking MD5[2] in Crypto 2004. Then A.Shamir announced weakness of SHA-1 for Wang in RSA 2005. Both events established milestones in cryptology and information security.o break MD5, Wang makes use of differential attack and offers necessary collision conditions for plain and middle parameter values. As for these conditions, Wang didn’t mention how they were deduced, neither did other scholars. Nevertheless it is the key technology of breaking MD5.n this paper, the algorithm and weakness of MD5 are presented. Then Wang’s method of breaking MD5 and reasons of collision conditions are given. Finally, a solution to resist Wang’s attack is proposed to add to the guidelines of designing more secure next-generation hash functions.
Subjects
Xiaoyun Wang
MD5
hash function
collision
Differential Attack
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-98-P93922006-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):1e281aff47f3c41640009e7ec7d5858a