New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
From MaRDI portal
Publication:5458595
DOI10.1007/978-3-540-78967-3_14zbMATH Open1149.94331OpenAlexW1513711610MaRDI QIDQ5458595FDOQ5458595
Authors: Lei Wang, Kazuo Ohta, Noboru Kunihiro
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_14
Recommendations
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Updates on generic attacks against HMAC and NMAC
- Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC
- Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5
Cites Work
- Title not available (Why is that?)
- Keying hash functions for message authentication
- Title not available (Why is that?)
- Finding Collisions in the Full SHA-1
- Title not available (Why is that?)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Cited In (16)
- Unintended features of APIs: cryptanalysis of incremental HMAC
- New proofs for NMAC and HMAC: security without collision resistance
- Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Collisions of MMO-MD5 and their impact on original MD5
- Generic Related-Key Attacks for HMAC
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
This page was built for publication: New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458595)