International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Tunnels in Hash Functions: MD5 Collisions Within a Minute

Authors:
Vlastimil Klima
Download:
URL: http://eprint.iacr.org/2006/105
Search ePrint
Search Google
Abstract: In this paper we introduce a new idea of tunneling of hash functions. In some sense tunnels replace multi-message modification methods and exponentially accelerate collision search. We describe several tunnels in hash function MD5. Using it we find a MD5 collision roughly in one minute on a standard notebook PC (Intel Pentium, 1.6 GHz). The method works for any initializing value. Tunneling is a general idea, which can be used for finding collisions of other hash functions, such as SHA-1, 2. We show several capabilities of tunnels. A program, which source code is available on a project homepage, experimentally verified the method. Revised version of this paper contains the appendix with the description of more tunnels. These tunnels further decrease the average time of MD5 collision to 31 seconds. On PC Intel Pentium 4 (3,2 GHz) it is 17 seconds in average.
BibTeX
@misc{eprint-2006-21598,
  title={Tunnels in Hash Functions: MD5 Collisions Within a Minute},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / Hash function, MD5, collision, multi-message modification method, tunnel, tunneling},
  url={http://eprint.iacr.org/2006/105},
  note={ v.klima@volny.cz 13255 received 18 Mar 2006, last revised 17 Apr 2006},
  author={Vlastimil Klima},
  year=2006
}