首页
社区
课程
招聘
MD5 was cracked!
2004-8-25 12:26 4354

MD5 was cracked!

2004-8-25 12:26
4354
Cryptology ePrint Archive: Report 2004/199
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD

Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu

Abstract.

Category / Keywords. Collisions Hash Functions MD4 MD5 RIPEMD HAVAL

Publication Info. no

Date: received 16 Aug 2004, last revised 17 Aug 2004

Contact author: lai-xj at cs sjtu edu cn

Available formats: PDF | BibTeX Citation
附件:199.rar

[培训]科锐软件逆向50期预科班报名即将截止,速来!!! 50期正式班报名火爆招生中!!!

收藏
免费 1
打赏
分享
最新回复 (5)
雪    币: 416
活跃值: (29)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
basaiyv1 2004-8-29 17:40
2
0
谁来翻译一下?
雪    币: 202
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
zansan 2004-8-29 19:59
3
0
MD5出现漏洞。
雪    币: 202
活跃值: (12)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
zephyrer 2004-9-10 23:10
4
0
雪    币: 5143
活跃值: (363)
能力值: (RANK:170 )
在线值:
发帖
回帖
粉丝
zmworm 4 2004-9-11 09:19
5
0
就是王小云的那个呀
不过,各种报道中对Hash的翻译 好像~~~~~~~有翻译成 “杂凑”,

感觉“散列”或“哈希”更为合理点,可能是个人习惯问题吧,嘿嘿
雪    币: 5143
活跃值: (363)
能力值: (RANK:170 )
在线值:
发帖
回帖
粉丝
zmworm 4 2004-9-11 09:46
6
0
NIST Brief Comments
on
Recent Cryptanalytic Attacks on Secure Hashing Functions
and
the Continued Security Provided by SHA-1
Cryptographic hash functions that compute a fixed size message digest from arbitrary
size messages are widely used for many purposes in cryptography, including digital
signatures. At the recent Crypto2004 conference, researchers announced that they had
discovered a way to "break" a number of hash algorithms, including MD4, MD5,
HAVAL-128, RIPEMD and the long superseded Federal Standard SHA-0 algorithm.
The current Federal Information Processing Standard SHA-1 algorithm, which has been
in effect since it replaced SHA-0 in 1994, was also analyzed, and a weakened variant was
broken, but the full SHA-1 function was not broken and no collisions were found in
SHA-1. The results presented so far on SHA-1 do not call its security into question.
However, due to advances in technology, NIST plans to phase out of SHA-1 in favor of
the larger and stronger hash functions (SHA-224, SHA-256, SHA-384 and SHA-512) by
2010. SHA-1 and the larger hash functions are specified in FIPS 180-2. For planning
purposes by Federal agencies and others, note also that the use of other cryptographic
algorithms of similar strength to SHA-1 will also be phased out in 2010.
SHA-1 and the stronger hash functions in FIPS 180-2 are all NIST approved. NIST
encourages the implementers of the FIPS 180-2 hash algorithms to have the correctness
of their implementations validated though the Cryptographic Module Validation
Program; such validation is required for Federal use.
NIST applauds the recent analysis and encourages more published research into hash
functions and their resistance to attack, particularly for newer algorithms such as SHA-
256 and SHA-512. Such analysis helps us continue to gain assurance in the security of
the algorithms we use.
8
-25-2004
游客
登录 | 注册 方可回帖
返回