Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
From MaRDI portal
Publication:5458929
DOI10.1007/978-3-540-79263-5_1zbMATH Open1153.94428OpenAlexW1567365729MaRDI QIDQ5458929FDOQ5458929
Yu Sasaki, Noboru Kunihiro, Kazuo Ohta, Lei Wang
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_1
Recommendations
- Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
- Message Freedom in MD4 and MD5 Collisions: Application to APOP
- Bit-Free Collision: Application to APOP Attack
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
- How to Break MD5 and Other Hash Functions
Cites Work
- Title not available (Why is that?)
- How to Break MD5 and Other Hash Functions
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Information Security and Privacy
- On the Security of Two MAC Algorithms
- Message Freedom in MD4 and MD5 Collisions: Application to APOP
- A Study of the MD5 Attacks: Insights and Improvements
Cited In (4)
This page was built for publication: Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458929)