Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to make a chaining value satisfy several sufficient...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74650625/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537641176104960 |
---|---|
author | CHEN Shi-wei JIN Chen-hui |
author_facet | CHEN Shi-wei JIN Chen-hui |
author_sort | CHEN Shi-wei |
collection | DOAJ |
description | According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to make a chaining value satisfy several sufficient conditions simultaneously and with it a method was presented to make it up. Moreover, two of the sufficient conditions were pointed out since they are no longer able to be modified by the method presented by Yu Sasaki et al in the new set of sufficient conditions proposed by Liang Jie and Lai Xuejia, and a new method was proposed to make one of them satisfied deterministically. Additionally, new multi-message modification techniques were presented to modify the other three sufficient conditions. Finally, the results are tested by computer simulations and produce new collision pairs for MD5. |
format | Article |
id | doaj-art-b049e0b8503646e28dea93247a019f8e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b049e0b8503646e28dea93247a019f8e2025-01-14T08:28:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130899574650625Research on the multi-message modification techniques on MD5CHEN Shi-weiJIN Chen-huiAccording to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to make a chaining value satisfy several sufficient conditions simultaneously and with it a method was presented to make it up. Moreover, two of the sufficient conditions were pointed out since they are no longer able to be modified by the method presented by Yu Sasaki et al in the new set of sufficient conditions proposed by Liang Jie and Lai Xuejia, and a new method was proposed to make one of them satisfied deterministically. Additionally, new multi-message modification techniques were presented to modify the other three sufficient conditions. Finally, the results are tested by computer simulations and produce new collision pairs for MD5.http://www.joconline.com.cn/zh/article/74650625/MD5message modification techniquesmulti-message modification techniquescollision attack |
spellingShingle | CHEN Shi-wei JIN Chen-hui Research on the multi-message modification techniques on MD5 Tongxin xuebao MD5 message modification techniques multi-message modification techniques collision attack |
title | Research on the multi-message modification techniques on MD5 |
title_full | Research on the multi-message modification techniques on MD5 |
title_fullStr | Research on the multi-message modification techniques on MD5 |
title_full_unstemmed | Research on the multi-message modification techniques on MD5 |
title_short | Research on the multi-message modification techniques on MD5 |
title_sort | research on the multi message modification techniques on md5 |
topic | MD5 message modification techniques multi-message modification techniques collision attack |
url | http://www.joconline.com.cn/zh/article/74650625/ |
work_keys_str_mv | AT chenshiwei researchonthemultimessagemodificationtechniquesonmd5 AT jinchenhui researchonthemultimessagemodificationtechniquesonmd5 |