Article

Article title ALGORITHMIC OPTIMIZATION OF INVERSE IMAGE COMPUTATION FOR MD5 AND MD4 DIGEST ALGORITHMS
Authors K.D. Mayzakov, D.A. Edel, V.A. Novosiadliy
Section SECTION VI. APPLICATION INFORMATION SECURITY ISSUES
Month, Year 12, 2012 @en
Index UDC 51-77
DOI
Abstract Current paper reports on the method of efficient inverse image computation for MD5 [1] and MD4 [2] digest algorithm. A review of existing attack methods is given in [3]. Existing software implementations [4, 5] are discussed. They are shown to be able to compute inverse image of up to 16 bytes length and implement a special case of proposed method. The results of computational experiments are given, which show the possibility of inverse image calculation of up to 55 bytes length, with computational speed better than existing implementations up to 15 % in average.

Download PDF

Keywords Digest algorithm; MD5; MD4; inverse image computation.
References 1. Rivest R. MD5 Algorithm. Network Working Group, Request for Comments: 1321. [Электронный ресурс] // MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992 / Режим доступа: http://tools.ietf.org/html/rfc1321.
2. Rivest R. MD4 Algorithm. Network Working Group, Request for Comments: 1320. [Электронный ресурс] // MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992 / Режим доступа: http://tools.ietf.org/html/rfc1320.
3. Sasaki A., Aoki K. Finding Preimages in Full MD5 Faster Than Exhaustive Search // EUROCRYPT 2009, LNCS 5479. – 2009. – P. 134-152.
4. Сваричевский М.А. Программное обеспечение Bars WF [Электронный ресурс] // Сваричевский М.А. 2010. Режим доступа: http://3.14.by/ru/.
5. Lightning Hash Cracker [Электронный ресурс] / ООО "Элкомсофт". 2010. Режим доступа: http://www.elcomsoft.ru/lhc.html.
6. Sotirov Alexander, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger. MD5 considered harmful today // http://www.win.tue.nl/ hashclash/rogue-ca.
7. Adleman LM, Rothemund PW, Roweis S, Winfree E. On applying molecular computation to the data encryption standard // J. Comput. Biol. – 1999 Spring. – Vol. 6, № 1. – P. 53-63.

Comments are closed.