By Topic

Construction of the Initial Structure for Preimage Attack of MD5

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ming Mao ; Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Shaohui Chen ; Jin Xu

The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of ¿divide-and-rule¿ technique, the successful possibility of the construction is higher than 2-32. Our construction is based on the MD5 structure, the message modification technique which is improved from Wang's. Some related techniques such as the extential form of the signed difference and special role of MSB are applied. According to Sasaki's thought, the initial structure separates the one-block MD5 algorithm into two parts and generates two neutral message words corresponding to the two chaining variables. The two message words are independent of each part respectively. Therefore, it can be useful to generate a preimage of MD5 with a complexity of 2123.4 in theory.

Published in:

Computational Intelligence and Security, 2009. CIS '09. International Conference on  (Volume:1 )

Date of Conference:

11-14 Dec. 2009