Stone is shocked! MD5 algorithm is cracked!

xiaoxiao2021-03-06  68

Press: MD5 is not safe? Is SHA unsuperferable? Hash is over? I came to the office in the morning, I accidentally saw such a news, but I was searching for more than an hour online. I didn't find the original text of Professor Wang. Just see this news published by the mountains a few tens of minutes. Looking forward to IT colleagues provide more information, thank you! Mass discovery in the field of cryptography: Professor Wang Xiaoyun, Shandong University, successfully cracked MD5 2004-09-04 09:39 [This site News] August 17, 2004, Saint Barbala, California, is being held (CRYPTO'2004) The special report of three striker functions is arranged. After the International Famous Cipher Eli Biham and Antoine Joux have made the analysis of SHA-1 and give a collision of SHA-0, Professor Wang Xiaoyun from Shandong University has done the MD5, HAVAL-128, MD4 and RIPEMD algorithms. Report. On the venue, when she announced the crack result of the MD series algorithm, the report was excited applause. Professor Wang Xiaoyun sensited the audience and got the admiration of participating experts. At the end of the report, the participants warmly applauded, some scholars were tribute, which was rare in the cryptographic meeting. Why did Wang Xiaoyun's report cause such a big response? Because her research results as a major discovery of the codenics, the fortress of the world password standard MD5, which is the world password standard MD5, which triggered the sylves of the cryptography. The conference summary report wrote this: "What should we do? MD5 is hit; it is about to eliminate it from the application. SHA-1 is still alive, but I have seen it on the end. Now I have to start replacement SHA-1." Keywords: collision = Vulnerability = others can fake and use digital signatures. Hash function and digital signature (digital handprint) haveh function, also known as a mixed function, a password algorithm for extensive and important applications in the field of information security, has a model similar to fingerprint. In the network security protocol, the mixed function is used to handle electronic signatures, compressing lengthy signature files into a unique digital information, ensuring the legality and security of the original digital signature file like fingerprint authentication. SHA-1 and MD5 mentioned earlier are the most commonly used mixed functions. After the processing of these algorithms, the original information will also become a complete "fingerprint" even if only one letter is only a letter. This guarantees the uniqueness of processing information. Provide digital authentication for e-commerce. The secure mixture of the conflict function must satisfy two requirements when designing: one is looking for two inputs to get the same output value is not feasible, which is what we usually say; the second is to find an input It can obtain a given output in the calculation, ie, it is not possible to derive its initial state. Important computer security protocols now used, such as SSL, PGP uses a mixed function to sign, once you find two files can produce the same compression value, you can fake signatures, bring huge hazards to the network security field. MD5 is such a whispering function algorithm with a wide range of applications at home and abroad, which once considered very safe. However, Professor Wang Xiaoyun found that the "collision" of MD5 can be quickly found, which is the same "fingerprint". This means that after you sign a contract on the Internet, it is possible to find another contract with the same signature but a different content, so that the truse of the two contracts is not distinguished. Professor Wang Xiaoyun confirmed the use of MD5 algorithms to seriously threaten information system security, this discovery makes the current electronic signature legal effect and technical system challenged.

Therefore, the industry expert Princeton Computer Professor Edward Felten and other strong appeal for information systems replace the signature algorithm as soon as possible, and they emphasize that this is a problem that needs to be resolved immediately. The International Lecture I found that the four major research progress made in the face of the Hash function, and the Senior Chairman of the Crypto 2004, Jim Hughes, Jim Hughes, 2017, said that this news is too important, so he has set up for 24 years. First Network Broadcasting (Webcast). Hughes announced at the meeting: "The meeting will propose three research reports of Hash Collisions." One of them is a research found in several Chinese researches such as Wang Xiaoyun. On the evening of the 17th, Professor Wang Xiaoyun made his research results in a meeting. This article is completed by Wang Xiaoyun, Feng Deguo, Zhi Jia, the four-person red wave, including the deciphering results of the four famous HASH algorithms of MD5, HAVAL-128, MD4 and RIPEMD. When Professor Wang Xiaoyun announced only to their third amazing results, the venue was already applauded, and the report had to be interrupted. After the report, all the experts have a long-term applause of their highlights, some scholars even stand up to show their congratulations and admiration. When people applaud, the Professor, came to Jia Professor, was a little more interesting in the article. Due to version issues, the author is different from the set of constants and pre-standards used by the conference papers; after the meeting discovered this problem, Professor Wang Xiaoyun immediately changed the constant, and completed new data analysis in a short period of time. This surprisingly incredible small episode has proved the credibility of their papers, the effectiveness of the attack method, but highlights the success of the research work. At the end of the meeting, many experts surrounded by Professor Wang Xiaoyun, there is a short discussion, and sincere congratulations, the words of rendering. The main founder R. L. Rivest and A. Shamir, including the public key password, also expressed their joy and congratulations. International cryptography experts gave a high degree of evaluation of Professor Wang Xiaoyun. MD5 designer, and also the first designer R of the internationally known public key encryption algorithm standard RSA. Rivest wrote in the email: "These results undoubtedly impress people, she should get my best congratulations, of course, I don't want to see MD5, but people must respect the truth." Francois Grieu This is said: "Wang Xiaoyun, Feng Deguo, the latest achievements of Jia Jia and Red Wave show that they have successfully decipherled MD4, MD5, HAVAL-128, RIPEMD-128. And it is expected to complete the attack on SHA-0 at lower complexity Some preliminary problems have been resolved. They have won very warm applause. "Another expert Greg Rose, such comment:" I just listened to the report of Joux and Wang Xiaoyun, the technology used by Wang's technology can be used at any initial value 2 ^ 40 timesh operations identified the collision of SHA-0. She gave collisions on the four haveh functions in the report. She won for a long standing and cheering, (this is the first time in my impression). ... ... she is the hidden hero of today's cryptography. (Wang Xiaoyun Professor Wang Xiaoyun's work) Although there is no public, the result is no doubt, this technology does exist. ... I sit in front of Ron Rivest, I heard him comment Road: 'We have to do a lot of remembering.' "Stone breaking MD5 fortress crashed with a stone hitting thousands of layers, MD5 decipherment caused a fierce response in the cryptography. Experts say this is the password school in recent years, "the most substantive research progress", and each password-related website competes to report this amazing breakthrough.

MD5 crack special website Close MD5 cracking project authority website http://www.md5crk.com/ is set up for the public collection, and the website announced on August 17, 2004: "Chinese researchers have found complete MD5 algorithm collision; WANG, Feng, LAI and YU have announced the collision of MD5, MD4, HAVAL-128, RIPEMD-128 Hash function. This is the most substantive research progress in the field of cryptography in recent years. Use their Technology, you can find MD5 collision within a few hours. ... Due to this milestone discovery, the MD5CRK project will end within 48 hours. " In this regard, http://www.readyResponse.org Homepage is specifically reprinted with this report http://www.aspenLeaf.com/distribute/distrib-Recent.html and several other websites have also been reported. The authoritative website has issued a comment or reporting this major research results through statistics, and there are nearly 400 websites released, reference and comment on the results within two weeks of the paper. Many of the news websites in China also reported a major event in this password academic community with the "Running Algorithm Security Encryption Function". (Report http://www.technewsworld.com/perl/board/mboard.pl?board=lnitalkback&thread=895&txt=896&display=1&tview=896&display=1&tview=Expanded&mView=flat, the message reproduced multiple times on all news websites.) Oriental Shen Yun MD5 Terminator from China MD5 Crack Work, Professor Wang Xiaoyun is a thin, pair of women, thick lenses transmitted the math of mathematics. She learned from the famous mathematician Pan Yutong from the University of Shandong, in 1990, she was successfully applied to the password to the password in the well-known teacher of the famous mathematician Pan Chengdong, Mr. Pan, Yu Xiyuan, Shi Tao. In the school, many outstanding results have been obtained, and 863 project funding and national natural science fund projects have been obtained, and one of the department-level scientific and technological progress awards, writing more than 20 papers. Professor Wang Xiaoyun has begun research in Hash function from the end of the 1990s. She led the cryptographic student of Red Box, Wang Meiqin, Sun Qiuxi, Feng Yi and other composed, and professor Feng Deguo, Shanghai Jianda, and the famous scholars. Collaboration, after a long-term persistent effort, the key technologies of cracking the Hash function, successfully cracking MD5 and several other Hash functions. In recent years, her work has been strongly supported by Shandong University and School of School, special investment in building information security laboratories. Professor Shandong University Professor Huntao attaches great importance to the scientific research results of Professor Wang Xiaoyun. In June 2004, the leaders of Shandong University heard the work introduction of Professor Wang Xiaoyun, and the principal of Yoshao personally issued an invitation letter to invite domestic well-known information security experts to participate in the "Shandong University Information Safety Research Seminar", Mathematics Hospital. Professor Liu Jianya organized and hosted the meeting, and Professor Wang Xiaoyun announced a series of research results of MD5 and other algorithms. Experts gave a full affirmation of her research results and praised their persistent scientific research attitudes. A academician said that her research level is definitely not bad more than the international. The conclusion of this academician has been verified at the international password after a month, and foreign experts have such a strong response show that our work can be said not only the difference in international, but also in cracking the Hash function. . CertainKey, Canada, earlier, announced that the first collision staff of the MD5 algorithm will be given, and CertainKey's original intention is to use parallel computers to find collisions through birthday attacks, and Professor Wang Xiaoyun requires less computational time. Digital certification Your future is not a dream due to the decipherment of MD5, which has triggered a big debate on whether MD5 products can also use.

转载请注明原文地址:https://www.9cbs.com/read-110884.html

New Post(0)