首页 | 本学科首页   官方微博 | 高级检索  
     

关于Hash函数MD5的解析
引用本文:毛明,陈少晖,袁征,贾永兴.关于Hash函数MD5的解析[J].计算机科学,2009,36(11):106-108.
作者姓名:毛明  陈少晖  袁征  贾永兴
作者单位:1. 西安电子科技大学通信工程学院,西安,710071;北京电子科技学院信息安全系,北京,100070
2. 北京电子科技学院信息安全系,北京,100070;清华大学高等研究中心,北京,100084
基金项目:国家973计划,中国博士后科学基金资助项目 
摘    要:在王小云写的关于分析MD5算法文章的基础上,对MD5算法的破译进行进一步的解析.以MD5算法第八步为例,介绍了F函数的性质和差分路径的有效控制.从手工推算和程序实现两方面时MD5算法进行了解析和测试,对王的文章进行了部分修正,进一步说明了满足差分特征的条件和关键点.这对MD5和其他Hash函数的分析破译有着重要的作用.

关 键 词:差分控制  Hash函数  解析
收稿时间:2008/12/24 0:00:00
修稿时间:3/9/2009 12:00:00 AM

Cryptanalysis of the Hash Function MD5
MAO Ming,CHEN Shao-hui,YUAN Zheng,JIA Yong-xing.Cryptanalysis of the Hash Function MD5[J].Computer Science,2009,36(11):106-108.
Authors:MAO Ming  CHEN Shao-hui  YUAN Zheng  JIA Yong-xing
Affiliation:(Department of Communication Engineering, Xidian University, Xi' an 710071 , China);(Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China);(Center for Advanced Stady,Tsinghua University,Beijing 100084,China)
Abstract:This paper is about the cryptanalysis of the Hash function MDS, on the basis of the paper concerning the breaking the MD5 which was written by Wang et al.In this paper,the eighth step of MD5 algorithm was taken for exam-ple and the properties of the F function and the effective control of the differential path were introduced.The MD5 algo-rithm was cryptanalyzed from both the manual calculation and the testing program and some part of the paper written by Wang was amended.Finally, the conditions and key points of meeting the differential characteristics were discussed.In general, this paper plays an important role in eryptanalyzing and breaking the MD5 algorithm.
Keywords:MD5  MDS  Differential control  Hash function  Cryptanalysis
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号