International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

How to Construct Sufficient Condition in Searching Collisions of MD5

Authors:
Yu Sasaki
Yusuke Naito
Jun Yajima
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
Download:
URL: http://eprint.iacr.org/2006/074
Search ePrint
Search Google
Abstract: In Eurocrypt 2005, Wang et al. presented a collision attak on MD5. In their paper, they intoduced gSufficient Conditionh which would be needed to generate collisions. In this paper, we explain how to construct sufficent conditions of MD5 when a differential path is given. By applying our algorithm to a collision path given byWang et al, we found that sufficient conditions introduced by them contained some unnecessary conditions. Generally speaking, when a differential path is given, corresponding sets of sufficient conditions is not unique. In our research, we analyzed the differential path found by Wang et al, and we found a different set of sufficient conditions from that of Wang et al. We have generated collisions by using our sifficient conditions.
BibTeX
@misc{eprint-2006-21567,
  title={How to Construct Sufficient Condition in Searching Collisions of MD5},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / MD5,Collision Attack,Sufficient Condition},
  url={http://eprint.iacr.org/2006/074},
  note={ yu339@ice.uec.ac.jp 13203 received 24 Feb 2006},
  author={Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta},
  year=2006
}