About 50 results
Open links in new tab
  1. Why did MD4 replace MD2? - Cryptography Stack Exchange

    Feb 18, 2019 · The MD4 algorithm is being placed in the public domain for review and possible adoption as a standard. There is a clear emphasis on the algorithm's performance: The MD4 algorithm is …

  2. How were the constants chosen in round 2 and 3 in MD4?

    Mar 1, 2019 · Just reading Ron Rivest's explanation of MD4 the hash uses two round constants one $ \text {5A827999}$ on round $2$ and the other $\text {6ED9EBA1}$ on round $3$.

  3. What's the state of the art attack to get the first pre-image on MD4?

    Nov 19, 2022 · What's the state of the art attack to get the first pre-image on MD4? Is it still $2^ {102}$ as described by Gaëtan Leurent in "MD4 is Not One-Way" ?

  4. md4 - Why does a broken hash function undermine an HMAC?

    For instance, what makes MD4 a bad choice for an HMAC? In this case I am asking about MD4 because its less than ideal. I know that a preimage attack can be used to undermine the system, but …

  5. Is md5(x) xor md4(x) collision proof? - Cryptography Stack Exchange

    Dec 11, 2019 · Is md5 (x) xor md4 (x) collision proof? Ask Question Asked 6 years, 3 months ago Modified 6 years, 3 months ago

  6. terminology - The Collision Differential for MD4 - a question on ...

    Jul 8, 2018 · In the MD4 algorithm, the message which is being hashed is split into a series of 512-bit blocks. The collision attack which you reference forms a collision in a single block. That is, the attack …

  7. collision resistance - Is the HMAC of a broken hash such as MD2, MD5 ...

    Feb 10, 2021 · As we know, MD5 and SHA1 (to some extent) are broken, and older algorithms like SHA0 or MD4 and MD2 are very broken. Does this also imply that the corresponding HMACs are …

  8. Is the quality of hash function essential in HKDF?

    Jul 18, 2024 · MD4 has been broken a long time ago. Would using MD4 for HKDF create a vulnerability? Or is the quality of MD4 and other broken hash functions like MD5 and SHA-1 sufficient for usage in …

  9. hash - How to unhash sha256? Alternatives to brute force ...

    Jun 21, 2021 · The problem is that as you stack operations on top of each other, the characterization of the possible input values becomes more and more complicated. Eventually it becomes so …

  10. How a chosen prefix collision is more useful than a standard collision ...

    Jan 9, 2020 · Recently a paper has been released about SHA-1 chosen prefix collision. They present what a chosen prefix collision is, but I don't understand how is it more interesting than a standard …