New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
From MaRDI portal
Publication:5458595
Recommendations
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Updates on generic attacks against HMAC and NMAC
- Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC
- Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5
Cites work
- scientific article; zbMATH DE number 503258 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1394313 (Why is no real title available?)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- How to Break MD5 and Other Hash Functions
- Keying hash functions for message authentication
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
Cited in
(16)- Unintended features of APIs: cryptanalysis of incremental HMAC
- New proofs for NMAC and HMAC: security without collision resistance
- Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Collisions of MMO-MD5 and their impact on original MD5
- Generic Related-Key Attacks for HMAC
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
This page was built for publication: New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458595)