Cryptology ePrint Archive: Report 2006/360

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities

Marc Stevens and Arjen Lenstra and Benne de Weger

Abstract: We have shown how, at a cost of about $2^{52}$ calls to the MD5 compression function, for any two target messages $m_1$ and $m_2$, values $b_1$ and $b_2$ can be constructed such that the concatenated values $m_1\|b_1$ and $m_2\|b_2$ collide under MD5. Although the practical attack potential of this construction of \emph{target collisions} is limited, it is of greater concern than random collisions for MD5. In this note we sketch our construction. To illustrate its practicality, we present two MD5 based X.509 certificates with identical signatures but different public keys \emph{and} different Distinguished Name fields, whereas our previous construction of colliding X.509 certificates required identical name fields. We speculate on other possibilities for abusing target collisions.

Category / Keywords: applications / Hash collisions, X.509 certificates

Publication Info: Accepted at EuroCrypt 2007

Date: received 23 Oct 2006, last revised 5 Mar 2007

Contact author: b m m d weger at tue nl

Available format(s): PDF | BibTeX Citation

Note: Version 1.1, contains an appendix about differential path construction.

The EuroCrypt 2007 proceedings version will have the title "Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities". It contains a lot more details on the method of finding chosen-prefix collisions for MD-5, and somewhat less on the certificates. See www.win.tue.nl/hashclash.

Version: 20070305:100029 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]