MD5 encryption has been cracked

xiaoxiao2021-03-06  71

Major discovery in the field of cryptography: Professor Wang Xiaoyun, University of Shandong successfully cracked MD5

2004-09-04 09:39

[This site news] August 17, 2004 Santa Barla, the International Cryptology Conference (CRYPTO'2004), which is being held (CRYPTO'2004) has arranged special report on the mixed function. After the International Famous Cipher Eli Biham and Antoine Joux have made the analysis of SHA-1 and give a collision of SHA-0, Professor Wang Xiaoyun from Shandong University has done the MD5, HAVAL-128, MD4 and RIPEMD algorithms. Report. On the venue, when she announced the crack result of the MD series algorithm, the report was excited applause. Professor Wang Xiaoyun sensited the audience and got the admiration of participating experts. At the end of the report, the participants warmly applauded, some scholars were tribute, which was rare in the cryptographic meeting. Why did Wang Xiaoyun's report cause such a big response? Because her research results as a major discovery of the codenics, the fortress of the world password standard MD5, which is the world password standard MD5, which triggered the sylves of the cryptography. The conference summary report wrote this: "What should we do? MD5 is hit; it is about to eliminate it from the application. SHA-1 is still alive, but I have seen it on the end. Now I have to start replacement SHA-1." Keywords: collision = Vulnerability = others can fake and use digital signatures. Hash function and digital signature (digital handprint) haveh function, also known as a mixed function, a password algorithm for extensive and important applications in the field of information security, has a model similar to fingerprint. In the network security protocol, the mixed function is used to handle electronic signatures, compressing lengthy signature files into a unique digital information, ensuring the legality and security of the original digital signature file like fingerprint authentication. SHA-1 and MD5 mentioned earlier are the most commonly used mixed functions. After the processing of these algorithms, the original information will also become a complete "fingerprint" even if only one letter is only a letter. This guarantees the uniqueness of processing information. Provide digital authentication for e-commerce. The secure mixture of the conflict function must satisfy two requirements when designing: one is looking for two inputs to get the same output value is not feasible, which is what we usually say; the second is to find an input It can obtain a given output in the calculation, ie, it is not possible to derive its initial state. Important computer security protocols now used, such as SSL, PGP uses a mixed function to sign, once you find two files can produce the same compression value, you can fake signatures, bring huge hazards to the network security field. MD5 is such a whispering function algorithm with a wide range of applications at home and abroad, which once considered very safe. However, Professor Wang Xiaoyun found that the "collision" of MD5 can be quickly found, which is the same "fingerprint". This means that after you sign a contract on the Internet, it is possible to find another contract with the same signature but a different content, so that the truse of the two contracts is not distinguished. Professor Wang Xiaoyun confirmed the use of MD5 algorithms to seriously threaten information system security, this discovery makes the current electronic signature legal effect and technical system challenged. Therefore, the industry expert Princeton Computer Professor Edward Felten and other strong appeal for information systems replace the signature algorithm as soon as possible, and they emphasize that this is a problem that needs to be resolved immediately. The International Lecture I found that the four major research progress made in the face of the Hash function, and the Senior Chairman of the Crypto 2004, Jim Hughes, Jim Hughes, 2017, said that this news is too important, so he has set up for 24 years. First Network Broadcasting (Webcast).

Hughes announced at the meeting: "The meeting will propose three research reports of Hash Collisions." One of them is a research found in several Chinese researches such as Wang Xiaoyun. On the evening of the 17th, Professor Wang Xiaoyun made his research results in a meeting. This article is completed by Wang Xiaoyun, Feng Deguo, Zhi Jia, the four-person red wave, including the deciphering results of the four famous HASH algorithms of MD5, HAVAL-128, MD4 and RIPEMD. When Professor Wang Xiaoyun announced only to their third amazing results, the venue was already applauded, and the report had to be interrupted. After the report, all the experts have a long-term applause of their highlights, some scholars even stand up to show their congratulations and admiration. When people applaud, the Professor, came to Jia Professor, was a little more interesting in the article. Due to version issues, the author is different from the set of constants and pre-standards used by the conference papers; after the meeting discovered this problem, Professor Wang Xiaoyun immediately changed the constant, and completed new data analysis in a short period of time. This surprisingly incredible small episode has proved the credibility of their papers, the effectiveness of the attack method, but highlights the success of the research work. At the end of the meeting, many experts surrounded by Professor Wang Xiaoyun, there is a short discussion, and sincere congratulations, the words of rendering. The main founder R. L. Rivest and A. Shamir, including the public key password, also expressed their joy and congratulations. International cryptography experts gave a high degree of evaluation of Professor Wang Xiaoyun. MD5 designer, and also the first designer R of the internationally known public key encryption algorithm standard RSA. Rivest wrote in the email: "These results undoubtedly impress people, she should get my best congratulations, of course, I don't want to see MD5, but people must respect the truth." Francois Grieu This is said: "Wang Xiaoyun, Feng Deguo, the latest achievements of Jia Jia and Red Wave show that they have successfully decipherled MD4, MD5, HAVAL-128, RIPEMD-128. And it is expected to complete the attack on SHA-0 at lower complexity Some preliminary problems have been resolved. They have won very warm applause. "Another expert Greg Rose, such comment:" I just listened to the report of Joux and Wang Xiaoyun, the technology used by Wang's technology can be used at any initial value 2 ^ 40 timesh operations identified the collision of SHA-0. She gave collisions on the four haveh functions in the report. She won for a long standing and cheering, (this is the first time in my impression). ... ... she is the hidden hero of today's cryptography. (Wang Xiaoyun Professor Wang Xiaoyun's work) Although there is no public, the result is no doubt, this technology does exist. ... I sit in front of Ron Rivest, I heard him comment Tao: 'We have to do a lot of renething.' "Stone breaking MD5 fortress crashed a stone hit Qianliang wave, MD5 decipherment caused a fierce response in the cryptography. Experts say this is the password school in recent years, "the most substantive research progress", and each password-related website competes to report this amazing breakthrough. MD5 crack special website Close MD5 cracking project authority website http://www.md5crk.com/ is set up for the public collection, and the website announced on August 17, 2004: "Chinese researchers have found complete MD5 algorithm collision; WANG, Feng, LAI and YU have announced the collision of MD5, MD4, HAVAL-128, RIPEMD-128 Hash function. This is the most substantive research progress in the field of cryptography in recent years. Use their Technology, you can find MD5 collision within a few hours. ... Due to this milestone discovery, the MD5CRK project will end within 48 hours. "

In this regard, http://www.readyResponse.org Homepage is specifically reprinted with this report http://www.aspenLeaf.com/distribute/distrib-Recent.html and several other websites have also been reported. The authoritative website has issued a comment or reporting this major research results through statistics, and there are nearly 400 websites released, reference and comment on the results within two weeks of the paper. Many of the news websites in China also reported a major event in this password academic community with the "Running Algorithm Security Encryption Function". (Report http://www.technewsworld.com/perl/board/mboard.pl?board=lnitalkback&thread=895&txt=896&display=1&tview=896&display=1&tview=Expanded&mView=flat, the message reproduced multiple times on all news websites.) Oriental Shen Yun MD5 Terminator from China MD5 Crack Work, Professor Wang Xiaoyun is a thin, pair of women, thick lenses transmitted the math of mathematics. She learned from the famous mathematician Pan Yutong from the University of Shandong, in 1990, she was successfully applied to the password to the password in the well-known teacher of the famous mathematician Pan Chengdong, Mr. Pan, Yu Xiyuan, Shi Tao. In the school, many outstanding results have been obtained, and 863 project funding and national natural science fund projects have been obtained, and one of the department-level scientific and technological progress awards, writing more than 20 papers. Professor Wang Xiaoyun has begun research in Hash function from the end of the 1990s. She led the cryptographic student of Red Box, Wang Meiqin, Sun Qiuxi, Feng Yi, etc. Collaboration, after a long-term persistent effort, the key technologies of cracking the Hash function, successfully cracking MD5 and several other Hash functions. In recent years, her work has been strongly supported by Shandong University and School of School, special investment in building information security laboratories. Professor Shandong University Professor Huntao attaches great importance to the scientific research results of Professor Wang Xiaoyun. In June 2004, the leaders of Shandong University heard the work introduction of Professor Wang Xiaoyun, and the principal of Yoshao personally issued an invitation letter to invite domestic well-known information security experts to participate in the "Shandong University Information Safety Research Seminar", Mathematics Hospital. Professor Liu Jianya organized and hosted the meeting, and Professor Wang Xiaoyun announced a series of research results of MD5 and other algorithms. Experts gave a full affirmation of her research results and praised their persistent scientific research attitudes. A academician said that her research level is definitely not bad more than the international. The conclusion of this academician has been verified at the international password after a month, and foreign experts have such a strong response show that our work can be said not only the difference in international, but also in cracking the Hash function. . CertainKey, Canada, earlier, announced that the first collision staff of the MD5 algorithm will be given, and CertainKey's original intention is to use parallel computers to find collisions through birthday attacks, and Professor Wang Xiaoyun requires less computational time. Digital certification Your future is not a dream due to the decipherment of MD5, which has triggered a big debate on whether MD5 products can also use. At the personal forum of Professor Jeffrey I. Schiller, Massachusetts University, many passwordists have published valuable comments in the debate of "Bad Day At the Hash Function Factory" (http://jis.mit. EDU / PIPERMAIL / SAAG / 2004Q3 / 000913.html).

Jimees hughes of this International Cryptographic Conference commented "I believe this (crack MD5) is true, and if the collision exists, HMAC is no longer safe, ... I think we should throw MD5 "Hughes suggests that programming staff is best to start discarding MD5. He said: "Since the weakness of this algorithm is now exposed, before the effective attack launched, it is the time to evacuate." Similarly, the personal website of Edwards Felton, Professor Princeton (http://www.freedom-to -tinker.com/archives/000664.html also has similar comments. He said: "What is left to us? MD5 has been seriously injured; its application is to eliminate. SHA-1 is still alive, but it will not be very long, you must immediately change SHA-1, but what kind of Algorithm, this needs to reach consensus on password researchers. "This is the" http://www.tcs.hut.fi/~mjos/md5/ http://www.tcs.hut.fi/~mjos/md5/) "And the famous computer company Sun's Linuix expert Val Henson said:" We said that "SHA-1 can be used with confidence, others are not unsafe is unknown", now we can only summarize: "SHA-1 is not safe, Others are finished. "For the report of the Hash function algorithm represented by Professor Wang Xiaoyun, the US National Technology and Standards Bureau (NIST) issued special comments on August 24, 2004, the main content of the comments is:" At the nearest International Cryptographic Conference (CRYPTO 2004), researchers announced that they found the method of cracking several Hash algorithms, including MD4, MD5, HAVAL-128, RIPEMD and SHA-0. Analysis showed that the change algorithm of the reduction in the weakening conditions of SHA-1 in the 1994 SHA-0 became a federal information processing standard can be cracked; but the complete SHA-1 did not be crack, nor did the collisions of SHA-1. The results show that the safety of SHA-1 has no problem, but with the development of technology, the Technology and Standards Bureau plans to gradually eliminate SHA-1 before 2010, for other longer and safer algorithms (such as SHA-224, SHA-256, SHA-384 and SHA-512) is replaced. Detailed reviews See: http://csrc.nist.gov/hash_standards_comments.pdf August 28, 2004, the 11th National People's Congress Standing Committee Eleventh Conference Volumes Vote The electronic signature method. This legal requires reliable Electronic signature and handwritten signature or seal have the same legal effect. The adoption of electronic signature law marks that China's first "real information law" has been formally born, will be implemented on April 1, 2005. Experts believe This law will play an extremely important role in the development of China's e-commerce and e-government. Professor Wang Xiaoyun has discovered a amazing black hole in the information sky. We look forward to Wang Xiaoyun Professor Wang Xiaoyun and her team can achieve "Female Treasure" is escorted for human informationization. Http://www.view.sdu.edu.cn/news/news/sdyw/2004-09-04/1094261946.html http: //www.blogchina.com/new/display/43228.html ---------------------------Http://www.openphp. CN

转载请注明原文地址:https://www.9cbs.com/read-120163.html

New Post(0)