Misplaced Pages

MD4: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 05:36, 10 April 2004 editRedWolf (talk | contribs)Autopatrolled, Administrators94,948 edits added info about 1991 paper that showed MD4 was not secure← Previous edit Revision as of 14:29, 12 April 2004 edit undoMatt Crypto (talk | contribs)23,089 edits hash fn link, -redundant list of later hashes, -recommendation, other tweaksNext edit →
Line 1: Line 1:
'''MD4''' is a message digest ] (the fourth in a series) by Professor ] of ]. It implements a ] for use in message integrity checks. The digest length is 128 bits. Its design has been very influential; ]-xxx, ]-xxx, ], and others have all been based on this fundamental design. '''MD4''' is a message digest ] (the fourth in a series) designed by Professor ] of ]. It implements a ] for use in message integrity checks. The digest length is 128 bits. The algorithm has influenced later designs, such as the ], ] and ] algorithms.


MD4 was shown to be insecure by Den Boer and Bosselaers in a paper they published in ] and so it should not be used except for backwards compatibility. Many of the message digest designs based on it remain secure, in the sense that no effective attack has been discovered (or rather published!) against them. At this writing, they include: ] (the first version, SHA, was withdrawn by ] due to a 'newly discovered flaw'), ], and ]. Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in ]. Many of the subsequent message digest designs based on it remain secure, in the sense that no effective attack has been published against them.


{{msg:stub}} {{msg:stub}}

Revision as of 14:29, 12 April 2004

MD4 is a message digest algorithm (the fourth in a series) designed by Professor Ronald Rivest of MIT. It implements a cryptographic hash function for use in message integrity checks. The digest length is 128 bits. The algorithm has influenced later designs, such as the MD5, SHA and RIPEMD algorithms.

Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in 1991. Many of the subsequent message digest designs based on it remain secure, in the sense that no effective attack has been published against them.

This article is a stub. You can help Misplaced Pages by expanding it.