搜索结果: 1-11 共查到“军事学 MD4”相关记录11条 . 查询时间(0.037 秒)
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Logical cryptanalysis MD5 SHA-1 Satisfiability
2016/1/23
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more numerous because of its conceptual simplicity and ability to express a large set of various problems. Wit...
Finding collisions for MD4 hash algorithm using hybrid algorithm
Evolutionary algorithm hill climbing hash algorithm
2016/1/9
The modification of message that meets the sufficient conditions
for collision is found in the last step of differential attack proposed by
Wang et all. (2005) on MD4 hash algorithm. Here we show ho...
We propose an improved preimage attack on one-block MD4 with the time complexity $2^{94.98}$ MD4 compression function operations, as compared to $2^{107}$ in \cite{AokiS-sac08}. We research the attack...
Advanced Meet-in-the-Middle Preimage Attacks:First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Preimage MD4 Tiger SHA-2
2010/1/18
We revisit narrow-pipe designs that are in practical use, and their security
against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4,
and reduced SHA-2, with the resu...
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
MD4 Differential Path APOP NMAC
2009/6/2
In case of security analysis of hash functions, finding a good
collision-inducing differential paths has been only focused on. However,
it is not clear how differential paths of a hash function infl...
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
Hash Functions MD4 MD5 HAVAL-128 RIPEMD
2009/3/27
MD5 is the hash function designed by Ron Rivest [9] as a strengthened version of MD4 [8]. In 1993 Bert den Boer and Antoon Bosselaers [1] found pseudo-collision for MD5 which is made of the same messa...
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Security Encryption Modes MD4 MD5 HAVAL
2009/3/5
Statistical Multiparty Computation Based on Random Walks on Graphs.
In this paper, we propose an attack method to find collisions of MD4 hash function. This
attack is the improved version of the attack which was invented by Xiaoyun Wang et al [1].
We were able to fi...
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
HMAC NMAC HAVAL MD4 MD5 SHA-0 SHA-1
2008/11/25
HMAC is a widely used message authentication code and a pseudorandom
function generator based on cryptographic hash functions such as MD5 and SHA-1. It
has been standardized by ANSI, IETF, ISO and N...
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Hash function MultiCollision NearCollision differential path sufficient condition
2008/9/10
In this paper, we present a new type of MultiCollision attack
on the compression functions both of MD4 and 3-Pass HAVAL. For MD4,
we utilize two feasible different collision differential paths to fi...
In 2004, Wang et al. obtained breakthrough collision attacks on the main
hash functions from the MD4 family. The attacks are differential attacks in which one
closely follows the inner steps of the ...