## CryptoDB

### Go Yamamoto

#### Publications

Year
Venue
Title
2007
EPRINT
This paper shows an attack against APOP protocol which is a challenge-and-response protocol. We utilize the Wang's attack to make collisions in MD5, and apply it to APOP protocol. We confirmed that the first 3 octets of secret key can be recovered by several hundred queries under the man-in-the-middle environment.

#### Coauthors

Kazumaro Aoki (1)
Yu Sasaki (1)