Misplaced Pages

MD4: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 16:01, 4 November 2005 editPacoBell (talk | contribs)73 edits Added a wikilink to the first instance of "Pre-image attack"← Previous edit Revision as of 18:29, 4 November 2005 edit undoMatt Crypto (talk | contribs)23,089 edits update for attacks on later hash funcsNext edit →
Line 1: Line 1:
'''MD4''' is a message digest ] (the fourth in a series) designed by Professor ] of ] in 1990. It implements a ] for use in message integrity checks. The digest length is 128 bits. The algorithm has influenced later designs, such as the ], ] and ] algorithms. '''MD4''' is a message digest ] (the fourth in a series) designed by Professor ] of ] in 1990. It implements a ] for use in message integrity checks. The digest length is 128 bits. The algorithm has influenced later designs, such as the ], ] and ] algorithms.


Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in ]. Many of the subsequent message digest designs based on it remain secure, in the sense that no effective attack has been published against them. Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in ]. In August ], researchers reported generating ] in MD4 using "hand calculation" , alongside attacks on later hash function designs in the MD4/MD5/SHA/RIPEMD family.

In August ], researchers reported generating ] in MD4 using "hand calculation" .


==MD4 hashes== ==MD4 hashes==
Line 20: Line 18:
==See also== ==See also==
* ] * ]
* ]
* ]
* ] * ]



Revision as of 18:29, 4 November 2005

MD4 is a message digest algorithm (the fourth in a series) designed by Professor Ronald Rivest of MIT in 1990. It implements a cryptographic hash function for use in message integrity checks. The digest length is 128 bits. The algorithm has influenced later designs, such as the MD5, SHA and RIPEMD algorithms.

Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in 1991. In August 2004, researchers reported generating collisions in MD4 using "hand calculation" , alongside attacks on later hash function designs in the MD4/MD5/SHA/RIPEMD family.

MD4 hashes

The 128-bit (16-byte) MD4 hashes (also termed message digests) are typically represented as 32-digit hexadecimal numbers. The following demonstrates a 43-byte ASCII input and the corresponding MD4 hash:

MD4("The quick brown fox jumps over the lazy dog") = 1bee69a46ba811185c194762abaeae90

Even a small change in the message will (with overwhelming probability) result in a completely different hash, e.g. changing d to c:

MD4("The quick brown fox jumps over the lazy cog") = b86e130ce7028da59e672d56ad0113df

The hash of the zero-length string is:

MD4("") = 31d6cfe0d16ae931b73c59d7e0c089c0

See also

References

  • Hans Dobbertin, 1998. Cryptanalysis of MD4. J. Cryptology 11(4): 253–271
  • Hans Dobbertin: Cryptanalysis of MD4. Fast Software Encryption 1996: 53–69

External links

Cryptographic hash functions and message authentication codes
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
Category: