New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
From MaRDI portal
Publication:5458595
DOI10.1007/978-3-540-78967-3_14zbMath1149.94331OpenAlexW1513711610MaRDI QIDQ5458595
Kazuo Ohta, Lei Wang, Noboru Kunihiro
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_14
Related Items (5)
Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Keying Hash Functions for Message Authentication
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
This page was built for publication: New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5