Message Digest5
Prof. Neeraj Bhargava
Kapil Chauhan
Department of Computer Science
School of Engineering & Systems Sciences
MDS University, Ajmer
Introduction
Initial checking of integrity – checksums, then CRC
These are only good at detecting lost information due
to hardware or transmission errors
Potential Attack
A wants to obtain privileges from B
A generates two messages with the same hash
values
A presents an innocent message to B for his
digital signature
A applies the signature to the other malicious
message with the same hash
MD5
The solution lay in one-way hashing algorithms
These should keep two messages from colliding
They should also be sufficiently difficult to
reverse-engineer
MD5
MD5 represents the fifth iteration designed by
Ronald Rivest (RSA)
Others from other authors include Whirlpool and
SHA
MD5 is open-source and released under the GPL
MD5 is optimized for use on 32-bit computers
MD5 Hashing
MD5("The quick brown fox jumps over the lazy dog") =
9e107d9d372bb6826bd81d3542a419d6
MD5("The quick brown fox jumps over the lazy cog") =
1055d3e698d289f2af8663725127bd4b
MD5("") = d41d8cd98f00b204e9800998ecf8427e
Modern Flaws
MD5 uses a short 128-bit hash
MD5 has become a popular hashing tool through
PHP
PASSWORD HASHING
Rivest says his algorithm was never designed for
this usage
Long messages that need an integrity check
before encryption
MD5 Flaws
Rainbow tables for passwords
COLLISIONS!
MD5 Collisions
2004 Wang et. al delivered an algorithm that could
produce collisions in a few hours on an IBM p690
cluster
Algorithm was improved by Lenstra et. al in 2005 to a
few hours on a single laptop
Conclusion
A digest algorithm does not provide integrity if
collisions are so simple to produce
SHA or Whirlpool should be considered until a
replacement for MD5 can be found

More Related Content

PPTX
Message digest 5
PPT
MD5Algorithm
PDF
PPT
Hash Function & Analysis
PPTX
Cryptography Ashik
PPTX
Gray level transformation
PPTX
Elements of visual perception
Message digest 5
MD5Algorithm
Hash Function & Analysis
Cryptography Ashik
Gray level transformation
Elements of visual perception

More from chauhankapil (20)

PPTX
JSP Client Request
PPTX
Jsp server response
PPTX
Markov decision process
PPTX
RNN basics in deep learning
PPTX
Introduction to generative adversarial networks (GANs)
PPTX
Bayesian probabilistic interference
PPTX
PPTX
Exception handling in java
PPTX
Knowledge acquistion
PPTX
Knowledge based system
PPTX
Introduction of predicate logics
PPTX
Types of inheritance in java
PPTX
Representation of syntax, semantics and Predicate logics
PPTX
Inheritance in java
PPTX
Propositional logic
PPTX
Constructors in java
PPTX
Methods in java
PPT
Circular linked list
PPT
Doubly linked list
PPT
Linked list in DS
JSP Client Request
Jsp server response
Markov decision process
RNN basics in deep learning
Introduction to generative adversarial networks (GANs)
Bayesian probabilistic interference
Exception handling in java
Knowledge acquistion
Knowledge based system
Introduction of predicate logics
Types of inheritance in java
Representation of syntax, semantics and Predicate logics
Inheritance in java
Propositional logic
Constructors in java
Methods in java
Circular linked list
Doubly linked list
Linked list in DS
Ad

Recently uploaded (20)

PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PDF
Mechanics of materials week 2 rajeshwari
PDF
Lesson 3 .pdf
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PPTX
Micro1New.ppt.pptx the mai themes of micfrobiology
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PDF
Micro 4 New.ppt.pdf a servay of cells and microorganism
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PPTX
AI-Reporting for Emerging Technologies(BS Computer Engineering)
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
DOCX
An investigation of the use of recycled crumb rubber as a partial replacement...
PPTX
Principal presentation for NAAC (1).pptx
PPT
Programmable Logic Controller PLC and Industrial Automation
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
Unit1 - AIML Chapter 1 concept and ethics
Environmental studies, Moudle 3-Environmental Pollution.pptx
Design ,Art Across Digital Realities and eXtended Reality
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Mechanics of materials week 2 rajeshwari
Lesson 3 .pdf
MAD Unit - 3 User Interface and Data Management (Diploma IT)
Micro1New.ppt.pptx the mai themes of micfrobiology
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Micro 4 New.ppt.pdf a servay of cells and microorganism
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
AI-Reporting for Emerging Technologies(BS Computer Engineering)
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
An investigation of the use of recycled crumb rubber as a partial replacement...
Principal presentation for NAAC (1).pptx
Programmable Logic Controller PLC and Industrial Automation
Ad

MD 5

  • 1. Message Digest5 Prof. Neeraj Bhargava Kapil Chauhan Department of Computer Science School of Engineering & Systems Sciences MDS University, Ajmer
  • 2. Introduction Initial checking of integrity – checksums, then CRC These are only good at detecting lost information due to hardware or transmission errors
  • 3. Potential Attack A wants to obtain privileges from B A generates two messages with the same hash values A presents an innocent message to B for his digital signature A applies the signature to the other malicious message with the same hash
  • 4. MD5 The solution lay in one-way hashing algorithms These should keep two messages from colliding They should also be sufficiently difficult to reverse-engineer
  • 5. MD5 MD5 represents the fifth iteration designed by Ronald Rivest (RSA) Others from other authors include Whirlpool and SHA MD5 is open-source and released under the GPL MD5 is optimized for use on 32-bit computers
  • 6. MD5 Hashing MD5("The quick brown fox jumps over the lazy dog") = 9e107d9d372bb6826bd81d3542a419d6 MD5("The quick brown fox jumps over the lazy cog") = 1055d3e698d289f2af8663725127bd4b MD5("") = d41d8cd98f00b204e9800998ecf8427e
  • 7. Modern Flaws MD5 uses a short 128-bit hash MD5 has become a popular hashing tool through PHP PASSWORD HASHING Rivest says his algorithm was never designed for this usage Long messages that need an integrity check before encryption
  • 8. MD5 Flaws Rainbow tables for passwords COLLISIONS!
  • 9. MD5 Collisions 2004 Wang et. al delivered an algorithm that could produce collisions in a few hours on an IBM p690 cluster Algorithm was improved by Lenstra et. al in 2005 to a few hours on a single laptop
  • 10. Conclusion A digest algorithm does not provide integrity if collisions are so simple to produce SHA or Whirlpool should be considered until a replacement for MD5 can be found