中文    English

›› 2017, Vol. 29 ›› Issue (7): 39-42.doi: 10.13998/j.cnki.issn1002-1248.2017.07.009

• Network technology • Previous Articles     Next Articles

Security Analysis and Improvement of MD5 Encryption Algorithm

REN Jielin   

  1. Library of Southwest Petroleum University, Chengdu 610500, China
  • Received:2016-12-05 Online:2017-07-05 Published:2017-07-31

Abstract: Aiming at the potential safety hazard of MD5 encryption algorithm, this paper analyzed the methods of modular differential attack, birthday attack and preimage attack, and proposed the optimization algorithm for multiplication overflow of MD5 plaintext message block by focusing on the issue of detectable MD5 differential path, and used the characteristic of multiplication overflow to strengthen the confusion of the plaintext message and increase the difficult coefficient of inverse operation and the difficulty of differential path search, so as to prevent from the common attack algorithm and improve the reliability and stability. The results of the experiment showed that the improved algorithm was better than the original algorithm for anti-attack and collision capability.

Key words: MD5 algorithm

CLC Number: 

  • TN915.08
[1] 康辰,朱志祥.基于云计算技术的网络攻防实验平台[J].西安邮电大学学报,2013,18(3):87-91.
[2] 张宜,张焕国,覃中平,等.Fast Attack Algorithm on the MD5 Hash Function[J].上海交通大学学报:理学版,2006,11(2):140-145.
[3] RIVEST R.The MD5 Message-Digest Algorithm[S].RFC1321.MIT Laboratory for Computer Science and RSA DATA Security,Inc.April 1992.
[4] 张裔智,赵毅,汤小兵.MD5算法研究[J].计算机科学,2008,38(7):295-297.
[5] 白洪欢.MD5快速碰撞算法之研究[D].杭州:浙江大学,2010.
[6] 章照止.现代密码学基础[M].北京:北京邮电大学出版社,2004.
[7] Wang XY,Yu HB.How to break MD5 and other hash functions[C].In:Proc.of the Eurocrypt2005.LNCS 3494,Berlin:Springer-Verlag,2005.
[8] 周林,王政,韩文报.MD5差分和差分路径的自动化构造.算法[J].四川大学学报:工程科学版,2010, 42(6):133-137.
[9] 陈玮.MD5加密原理及安全性分析[J].网络通信与安全,2007,(19):87-88.
[10] SZYDLO M,YIN YL.Collision-resistant usage of MD5 and SHA-1via message preproeessing [C]//Proeeedings of the 15th Anual RSA Conference-Cryptographer's Track:CT-RSA06,LNCS3860.Heidelberg:SPringer-Verlag,2006.
[11] 张学旺,唐贤伦.MD5算法及其在文件系统完整性保护中的应用[J].计算机应用,2003,23(S2):430-432.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!