×

The second-preimage attack on MD4. (English) Zbl 1154.94442

Desmedt, Yvo G. (ed.) et al., Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30849-0/pbk). Lecture Notes in Computer Science 3810, 1-12 (2005).
Summary: In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicable to explore the second-preimage of MD4. About the second-preimage attack, they showed that a random message was a weak message with probability \(2^{-122}\) and it only needed a one-time MD4 computation to find the second-preimage corresponding to the weak message. A weak message means that there exits a more efficient attack than the brute force attack to find its second-preimage. In this paper, we find another new collision differential path which can be used to find the second-preimage for more weak messages. For any random message, it is a weak message with probability \(2^{-56}\), and it can be converted into a weak message by message modification techniques with about \(2^{27}\) MD4 computations. Furthermore, the original message is close to the resulting message (weak message), i.e, the Hamming weight of the difference for two messages is about 44.
For the entire collection see [Zbl 1098.94002].

MSC:

94A60 Cryptography
Full Text: DOI