A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Finding Preimages in Full MD5 Faster Than Exhaustive Search
[chapter]
2009
Lecture Notes in Computer Science
In this paper, we present the first cryptographic preimage attack on the full MD5 hash function. This attack, with a complexity of 2 116.9 , generates a pseudo-preimage of MD5 and, with a complexity of 2 123.4 , generates a preimage of MD5. The memory complexity of the attack is 2 45 × 11 words. Our attack is based on splice-and-cut and localcollision techniques that have been applied to step-reduced MD5 and other hash functions. We first generalize and improve these techniques so that they can
doi:10.1007/978-3-642-01001-9_8
fatcat:l2sc6t7evrf5bpfrfzz7qemoha