TY - GEN
T1 - On the security of encryption modes of MD4, MD5 and HAVAL
AU - Kim, Jongsung
AU - Biryukov, Alex
AU - Preneel, Bart
AU - Lee, Sangjin
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2005
Y1 - 2005
N2 - In this paper, we cryptanalyze the compression functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption mode. We exploit the recently proposed related-key rectangle and boomerang techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL and to distinguish them from a randomly chosen cipher. The attacks are highly practical and have been confirmed by our experiments.
AB - In this paper, we cryptanalyze the compression functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption mode. We exploit the recently proposed related-key rectangle and boomerang techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL and to distinguish them from a randomly chosen cipher. The attacks are highly practical and have been confirmed by our experiments.
UR - http://www.scopus.com/inward/record.url?scp=33646736559&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33646736559&partnerID=8YFLogxK
U2 - 10.1007/11602897_13
DO - 10.1007/11602897_13
M3 - Conference contribution
AN - SCOPUS:33646736559
SN - 3540309349
SN - 9783540309345
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 147
EP - 158
BT - Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings
PB - Springer Verlag
T2 - 7th International Conference on Information and Communications Security, ICICS 2005
Y2 - 10 December 2005 through 13 December 2005
ER -