Article

Article title ESPECIAL MODES OF ALGORITHMIC STUCTURE FOR HASH FUNCTIONS OPTIMIZATION AND COMPUTING IN A NETWORK ENVIRONMENT
Authors D.N. Bosikov, R.A. Hady
Section SECTION V. ALGORITHMS AND MODELLING, INFORMATION SAFETY
Month, Year 01, 2013 @en
Index UDC 51-77
DOI
Abstract Current paper reports on the method of efficient inverse image computation for MD5 [1] and MD4 [2] digest algorithm for use in fasting network environment. Existing software implementations of network traffics absorbers and handlers are relayed on extra fast hash computing methods. They are shown to be able sufficiently rise effectiveness if laid on effective hash computing algorithms. The results of creating such a method and results of computational experiments are given, which show the possibility of inverse image calculation of up to 55 bytes length, with computational speed better than existing implementations up to 15% in average.

Download PDF

Keywords Digest algorithm; MD5; MD4; inverse image computation.
References 1. Rivest R. MD5 Algorithm. Network Working Group, Request for Comments: 1321. [Электронный ресурс] // MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992 / Режим доступа: http://tools.ietf.org/html/rfc1321.
2. Rivest R. MD4 Algorithm. Network Working Group, Request for Comments: 1320. [Электронный ресурс] // MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992 / Режим доступа: http://tools.ietf.org/html/rfc1320.
3. Lightning Hash Cracker [Электронный ресурс] / ООО "Элкомсофт". 2010. Режим доступа: http://www.elcomsoft.ru/lhc.html.
4. Sotirov A., Stevens M., Appelbaum J., Lenstra A., Molnar D., Osvik D.A., MD5 considered harmful today // http://www.win.tue.nl/hashclash/rogue-ca.
5. Adleman L.M., Rothemund P.W., Roweis S., Winfree E. On applying molecular computation to the data encryption standard // J. Comput. Biol. – 1999 Spring. – Vol. 6. Iss. 1. – P. 53-63.
6. Сонг Я. Криптоанализ RSA. – М.: НИЦ "Регулярная и хаотическая динамика", 2011. − 312 с.
7. Просис К., Мандиа К. Расследование компьютерных преступлений. – М.: Лори, 2012. − 496 с.
8. Ховард М., Лебланк Д., Виега Д. Уязвимости в программном коде и борьба с ними. – СПб.: ДМК Пресс, 2011. − 288 с.
9. Низамутдинов М. Тактика защиты и нападения на Web-приложения. – СПб.: БХВ-Петербург, 2007. − 432 с.
10. Wheeler E. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – Syngress, 2011. − 360 p.
11. Шелупанов А., Груздев С., Нахаев Ю. Аутентификация. Теория и практика обеспечения безопасного доступа к информационным ресурсам. – М.: Горячая Линия-Телеком, 2012. − 552 с.

Comments are closed.