Misplaced Pages

MD4: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 21:43, 19 July 2004 editMatt Crypto (talk | contribs)23,089 edits references← Previous edit Revision as of 20:49, 18 August 2004 edit undoMatt Crypto (talk | contribs)23,089 edits In August 2004, researchers reported generating collisions in MD4 using "hand calculation" .Next edit →
Line 2: Line 2:


Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in ]. Many of the subsequent message digest designs based on it remain secure, in the sense that no effective attack has been published against them. Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in ]. Many of the subsequent message digest designs based on it remain secure, in the sense that no effective attack has been published against them.

In August ], researchers reported generating ] in MD4 using "hand calculation" .


==See also== ==See also==

Revision as of 20:49, 18 August 2004

MD4 is a message digest algorithm (the fourth in a series) designed by Professor Ronald Rivest of MIT. It implements a cryptographic hash function for use in message integrity checks. The digest length is 128 bits. The algorithm has influenced later designs, such as the MD5, SHA and RIPEMD algorithms.

Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in 1991. Many of the subsequent message digest designs based on it remain secure, in the sense that no effective attack has been published against them.

In August 2004, researchers reported generating collisions in MD4 using "hand calculation" .

See also

References

  • Hans Dobbertin, 1998. Cryptanalysis of MD4. J. Cryptology 11(4): 253–271
  • Hans Dobbertin: Cryptanalysis of MD4. Fast Software Encryption 1996: 53–69

External links

This article is a stub. You can help Misplaced Pages by expanding it.

Category: