Md2 is not Secure Without the Checksum Byte

  • Authors:
  • N. Rogier;Pascal Chauvaud

  • Affiliations:
  • CNET PAA/TSA/SRC, 38-40, rue du Général Leclerc, 92131 Issy Les Moulineaux (France);CNET PAA/TSA/SRC, 38-40, rue du Général Leclerc, 92131 Issy Les Moulineaux (France). E-mail: pascal.chauvaud@issy.cnet.fr

  • Venue:
  • Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 1989, Ron Rivest introduced the MD2 Message DigestAlgorithm which takes as input a message of arbitrary lengthand produces as output a 128-bit message digest, by appendingsome redundancy to the message and then iteratively applyinga 32 bytes to 16 bytes compression function. MD2 Message DigestAlgorithm is one of the most frequently used hashing functionwith MD4, MD5, SHA, SHA-1. Some attacks against MD4 and MD5 havebeen presented by Dobbertin. Up to now, no attack against MD2has been presented.This function has beenupdated in 1993 in the RFC 1423 document. It was conjecturedthat the number of operations needed to get two messages havingthe same message digest is on the order of 2^64(using the birthday paradox), and that the complexity of invertingthe hash function is on the order of 2^128 operations.No attack against this function has been published so far. Inthis paper, we propose a low complexity method to find collisionsfor the compression function of MD2. The easiness to find thesecollisions could imply that the first conjecture is false ifthese collisions can be used to make global collisions for MD2.