## CryptoDB

### Paper: How to Construct Sufficient Condition in Searching Collisions of MD5

Authors: Yu Sasaki Yusuke Naito Jun Yajima Takeshi Shimoyama Noboru Kunihiro Kazuo Ohta URL: http://eprint.iacr.org/2006/074 Search ePrint Search Google In Eurocrypt 2005, Wang et al. presented a collision attak on MD5. In their paper, they intoduced gSufficient Conditionh which would be needed to generate collisions. In this paper, we explain how to construct sufficent conditions of MD5 when a differential path is given. By applying our algorithm to a collision path given byWang et al, we found that sufficient conditions introduced by them contained some unnecessary conditions. Generally speaking, when a differential path is given, corresponding sets of sufficient conditions is not unique. In our research, we analyzed the differential path found by Wang et al, and we found a different set of sufficient conditions from that of Wang et al. We have generated collisions by using our sifficient conditions.
##### BibTeX
@misc{eprint-2006-21567,
title={How to Construct Sufficient Condition in Searching Collisions of MD5},
booktitle={IACR Eprint archive},
keywords={secret-key cryptography / MD5,Collision Attack,Sufficient Condition},
url={http://eprint.iacr.org/2006/074},
note={ yu339@ice.uec.ac.jp 13203 received 24 Feb 2006},
author={Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta},
year=2006
}