Preimage Attacks on One-Block MD4, 63-Step MD5 and More
From MaRDI portal
Publication:3644195
DOI10.1007/978-3-642-04159-4_7zbMath1256.94040OpenAlexW1814882979MaRDI QIDQ3644195
Publication date: 3 November 2009
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04159-4_7
Related Items (32)
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ New Attacks on Feistel Structures with Improved Memory Complexities ⋮ Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ A Framework for Automated Independent-Biclique Cryptanalysis ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Improved attacks against reduced-round Whirlwind ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ A single-key attack on the full GOST block cipher ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ Finding Preimages in Full MD5 Faster Than Exhaustive Search ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Two Passes of Tiger Are Not One-Way ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL ⋮ New attacks on IDEA with at least 6 rounds
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Preimage Attacks on Step-Reduced MD5
- MD4 is Not One-Way
- Preimages for Reduced SHA-0 and SHA-1
- Inversion Attacks on Secure Hash Functions Using sat Solvers
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- The First Two Rounds of MD4 are Not One-Way
- How to Break MD5 and Other Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
This page was built for publication: Preimage Attacks on One-Block MD4, 63-Step MD5 and More