Cryptology ePrint Archive: Report 2005/102
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
Vlastimil Klima
Abstract: In this paper, we summarize the results achieved during our brief three months long research on collisions of the MD5 hash function. Being inspired by the results announced by Wang et al. [1] we independently developed methods for finding collisions which work for any initialization value and which are quicker than the methods presented in [1, 8]. It enables us to find a MD5 collision on a standard notebook PC roughly in 8 hours [7]. Independently on [1, 8], we discovered and propose several multi-message modification methods, which are more effective than methods described in [1, 8]. We show their principle.
Category / Keywords: secret-key cryptography / MD5, collision, multi-message modification, hash function
Publication Info: will be presented at 3rd International Scientific Conference Security and Protection of Information, Brno, Czech Republic, May 3 - 5, 2005
Date: received 5 Apr 2005
Contact author: v klima at volny cz
Available format(s): PDF | BibTeX Citation
Version: 20050405:073207 (All versions of this report)
Short URL: ia.cr/2005/102
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]