Abstract - In August 2004 at the annual cryptography conference in Santa Barbara, California a group of Chinese cryptographers
نویسندگان
چکیده
In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu made the announcement that they had successfully generated two files with different contents that had the same MD5 hash. This paper reviews the announcement and discusses the impact this discovery may have on the use of MD5 hash functions for evidence authentication in the field of computer forensics. Published by Elsevier Ltd. Hash functions are one of the basic building blocks of modern cryptography. In cryptography hash functions are used for everything from password verification to digital signatures. A hash function has three fundamental properties: • A hash function must be able to easily convert digital information (i.e. a message) into a fixed length hash value. • It must be computationally infeasible to derive any information about the input message from just the hash. • It must be computationally infeasible to find two files to have the same hash. Hash (Message 1) = Hash (Message 2). In computer forensics hash functions are important because they provide a means of identifying and classifying electronic evidence. Because hash functions play a critical role in evidence authentication it is critical a judge or jury can trust the hash values that uniquely identify electronic evidence. The third property of a hash function states that it must be computationally infeasible to find two files to have the same hash. The research published by Wang, Feng, Lai and Yu demonstrated that MD5 fails this third requirement since two different messages have been generated that have the same hash. This situation is called a collision.
منابع مشابه
Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings
Thank you for reading advances in cryptology crypto 98 18th annual international cryptology conference santa barbara california u s a august 23 27 1998 proceedings. Maybe you have knowledge that, people have search numerous times for their favorite novels like this advances in cryptology crypto 98 18th annual international cryptology conference santa barbara california u s a august 23 27 1998 p...
متن کاملAdvances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings
It's coming again, the new collection that this site has. To complete your curiosity, we offer the favorite advances in cryptology crypto 2006 26th annual international cryptology conference santa barbara california usa august 20 24 2006 proceedings lecture notes in computer science book as the choice today. This is a book that will show you even new to old thing. Forget it; it will be right fo...
متن کاملAdvances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings
By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this advances in cryptology crypto 99 19th annual international cryptology conference santa barbara california u s a august 15 19 1999 proceedings, it will really give you the good idea to be successful. It is not only for you to be success in certain life you...
متن کاملMany-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems
Citation Bellare, Mihi, Shai Halevi, Amit Sahai, and Salil Vadhan. 1998. Many-to-one trapdoor functions and their relation to public-key cryptosystems. In Advances in Cryptology--Proceedings of CRYPTO '98, 18th Annual International Conference, Santa Barbara, California,August 23-27, 1998, ed. Hugo Krawczyk, Berlin: Springer.H. Krawczyk, editor, 283-299. Advances in Cryptology CRYPTO `98, Lectur...
متن کاملMD 5 collisions and the impact on computer forensics Eric
In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu, made the announcement that they had successfully generated two files with different contents that had the same MD5 hash. This paper reviews the announcement and discusses the impact this discovery may have on the use of MD5 hash function...
متن کامل