• Title/Summary/Keyword: MD-5

Search Result 1,140, Processing Time 0.098 seconds

Security Analysis of Block Cipher MD-64 Suitable for Wireless Sensor Network Environments (무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.865-870
    • /
    • 2011
  • MD-64 is a 64-bit block cipher suitable for the efficient implementation in hardware environments such as WSN. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. The attack on the full-round MD-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{95}$ MD-64 encryptions. This work is the first known cryptanalytic result on MD-64.

Approximated Model and Chaining Pattern of Hash Functions (해쉬 함수의 근사적 모델과 연쇄패턴)

  • Lee Sun-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.39-47
    • /
    • 2006
  • The evaluation of MDx family hash functions such as MD5 is difficult because the design background or a generalized model is unknown. In this paper, an approximated model is proposed to generalize hash functions. The diffusion of a input difference is tested by an approximated model for MD5. The results show that MD5 does not provide perfect diffusion, so MD5 is weak against some attacks. We propose a multiple chaining pattern which provides perfect diffusion in approximated model of hash function without extra calculation or memory. And We show the probability of differential characteristics of our proposal.

  • PDF

A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms (MD5 및 HAS-160 해쉬 알고리즘을 통합한 면적 효율적인 설계에 관한 연구)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1015-1022
    • /
    • 2012
  • This paper deals with hardware design which unifies MD5 and HAS-160 hash algorithms. Two algorithms get a message with arbitrary length and process message blocks divided into 512 bits each time and output a hash code with a fixed length. MD5 ouputs a hash code of 128 bits and HAS-160 a hash code of 160 bits. The unified hash core designed has 32% of slices overhead compared to HAS-160 core. However, there is only a fixed message buffer space used. The unified hash core which run a step in one clock cycle operates at 92MHz and has performance which digests a message in the speed of 724Mbps at MD5 and 581Mbps at HAS-160 hash mode. The unified hash core which is designed can be applicable to the areas such as E-commerce, data integrity and digital signature.

Design of MD5 Hash Processor with Hardware Sharing and Carry Save Addition Scheme (하드웨어 공유와 캐리 보존 덧셈을 이용한 MDS 해쉬 프로세서의 설계)

  • 최병윤;박영수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.139-149
    • /
    • 2003
  • In this paper a hardware design of area-efficient hash processor which implements MD5 algorithm using hardware sharing and carry-save addition schemes is described. To reduce area, the processor adopts hardware sharing scheme in which 1 step operation is divided into 2 substeps and then each substep is executed using the same hardware. Also to increase clock frequency, three serial additions of substep operation are transformed into two carry-save additions and one carry propagation addition. The MD5 hash processor is designed using 0.25 $\mu\textrm{m}$CMOS technology and consists of about 13,000 gates. From timing simulation results, the designed MD5 hash processor has 465 Mbps hash rates for 512-bit input message data under 120 MHz operating frequency.

The Study and Improvement of Boolean Function Property of MD5 Hash Function (MD5 해쉬함수의 부울함수 특성 고찰 및 개선)

  • 이원준;이국희;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.185-194
    • /
    • 1995
  • 일방성 해쉬함수는 임의 길이의 입력메세지를 일정한 길이의 출력메세지로 축약하는 함수로서, 디지탈서명에서 서명을 생성하는 시간을 단축하고 메세지 인증을 위한 암호학적 도구로 사용되고있다. 본 논문에서는 부울함수를 기초로 하는 해쉬함수 중에서 MD5의 부울함수를 정보이론의 관점에서 분석하여 암호학적으로 강하고 기존의 MD5에서 사용된 부울함수의 성질을 이용한 공격을 막을 수 있는 새로운 부울함수를 제안한다.

  • PDF

An Optimal Design Method for the Multidimensional Nested Attribute Indexes (다차원 중포 속성 색인구조의 최적 설계기법)

  • 이종학
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.194-207
    • /
    • 2003
  • This paper presents an optimal design methodology for the multidimensional nested attribute index (MD-NAI) that uses a multidimensional index structure for indexing the nested attributes in object databases. The MD-NAI efficiently supports complex queries involving both nested attributes and class hierarchies, which are not supported by the nested attribute index using one-dimensional index structure such as $B^+$-tree. However, the performance of the MD-NAI is very degraded in some cases of user's query types. In this paper, for the performance enhancement of the MD-NAI, we first determine the optimal shape of index page region by using the query information about the nested predicates, and then construct an optimal MD NAI by applying a region splitting strategy that makes the shape of the page regions of the MD-NAI as close as possible to the predetermined optimal one. For performance evaluation, we perform extensive experiments with the MD-NAI using various types of nested predicates and object distribution. The results indicate that our proposed method builds optimal MD-NAI regardless of the query types and object distributions. When the interval ratio of a three-dimensional query region is 1:16:236, the performance of the proposed method is enhanced by as much as 5.5 times over that of the conventional method employing the cyclic splitting strategy.

  • PDF

A Study on Quality Characteristics of Dangmyon(starch vermicelli) added with Mulberry Leaves Powder (뽕잎분말을 첨가한 당면의 품질특성에 관한 연구)

  • Jeon, Seo-Young;Lee, Young-Sook;Rho, Jeong-Ok
    • Korean Journal of Human Ecology
    • /
    • v.24 no.3
    • /
    • pp.437-449
    • /
    • 2015
  • The purpose of this study was to investigate the quality characteristics of Dangmyon(starch vermicelli) prepared with mulberry leaves powder. Mulberry leaves powder was added in ratios (w/w) of 0% (CON), 0.5% (MD1), 1.0% (MD2), 1.5% (MD3). and 2.0%(MD4), and then proximate compositions, physicochemical properties, RVA, SEM, texture and sensory evaluations of the Dangmyon were measured. MD1~MD4 samples showed higher contents of moisture, crude lipid, crude protein and crude ash as well as pH compared to control (p<0.001). In terms of color, lightness (L), yellowness (b), and redness (a) decreased as the mulberry leaves powder increased. The results of RVA properties analysis on all samples showed that control had the highest. With regard to the texture of Dangmyon samples, the scores of hardness, adhesiceness, gumminess, chewiness, resilience of CON was significantly higher than the samples MD1~MD4 (p<0.001), but the scores of springiness, cohesiveness was not significantly among samples. The result of observation on the cross section of Dangmyon added with mulberry leaves powder showed that number, size of cavity more increase compared to the control. In sensory evaluation, the scores of appearance, flavor, taste and overall preference for MD3 were significantly higher than the samples (CON, MD1, MD2, and MD4). From the findings, this study suggests that 1.5% addition of mulberry leaves powder was effective for preparation of Dangmyon in the aspects of the consumer acceptability.

Design of a HMAC for a IPsec's Message Authentication Module (IPsec의 Message Authentication Module을 위한 HMAC의 설계)

  • 하진석;이광엽;곽재창
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.117-120
    • /
    • 2002
  • In this paper, we construct cryptographic accelerators using hardware Implementations of HMACS based on a hash algorithm such as MD5.It is basically a secure version of his previous algorithm, MD4 which is a little faster than MD5 The algorithm takes as Input a message of arbitrary length and produces as output a 128-blt message digest The input is processed In 512-bit blocks In this paper, new architectures, Iterative and full loop, of MD5 have been implemented using Field Programmable Gate Arrays(FPGAS). For the full-loop design, the performance Is about 500Mbps @ 100MHz

  • PDF

Optimal Design Method of Multidimensional Nested Attribute Indexes for Object-Oriented Query Processing (객체지향 질의처리를 위한 다차원 중포 속성 색인구조의 최적 설계기법)

  • Yoon, Dong-Ha;Lee, Jong-Hak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1863-1866
    • /
    • 2002
  • 본 논문에서는 객체지향 데이터베이스 시스템에서 중포 속성에 대한 색인구조로 다차원 색인구조를 이용하는 다차원 중포 색인구조(Multidimensional Nested Attribute Index: MD-NAI)의 최적 설계기법을 제시한다. MD-NAI는 일차원 색인구조를 이용한 중포 속성 색인구조에서 지원할 수 없는 클래스 계층상의 클래스 대치가 있는 중포 술어의 질의처리를 잘 지원할 수 있다. 그러나, MD-NAI는 사용자 질의 형태에 따라 색인검색의 성능이 매우 나빠질 수 있다. 본 논문에서는 질의 형태에 따른 MD-NAI의 성능 개선을 위하여, 먼저 중포 술어에 대한 질의 정보로서 MD-NAI의 색인 페이지 영역의 최적 모양을 결정하고, 이 최적 모양을 갖는 색인 페이지 영역의 모양이 되도록 하는 영역분할 전략을 적용한다. 성능평가의 결과에 의하면, 주어진 질의 패턴에 따라 최적의 MD-NAI를 구성할 수 있었으며, 삼차원 MD-NAI의 경우에 질의 형태에 따라 5.5배까지 성능이 향상되었다.

  • PDF

Implementation of high speed MD5 processor using CSA (CSA를 사용한 고속 MD5 프로세서 구현)

  • Yoon, Hee-Jin;Jeong, Yong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.837-840
    • /
    • 2002
  • 본 논문에서는 해쉬 함수를 바탕으로 한 메시지 인증 코드 중의 하나인 MD5 를 하드웨어로 설계하였다. MD5 는 block-chained digest 알고리즘으로 64 단계의 동일한 단계 연산 구조를 가지므로 가장 기본적인 연산 한 단계를 구현하여 반복적으로 수행하는 구조로 설계하였다. 단계 연산구조 내에서는 연속된 32bit 덧셈 연산이 이루어지는데 기존의 CLA(carry-lookahead-adder)만을 사용하여 구현한 구조 대신 본 논문에서는 CSA(carry-save-adder)와 CLA 를 혼용하였다. 덧셈연산의 결과는 순서와 상관없기 때문에 연산자의 덧셈 순서를 리스케줄링 하였으며, 이는 기존의 CLA 만을 이용한 방법과 비교하여 최장지연 경로를 15% 줄여 훨씬 빠르게 연산을 수행하고, 전체 면적도 30%를 줄일 수 있었다. 결과적으로 본 논문에서 제안하는 구조는 지금까지 나온 어떤 MD5 프로세서 보다 작고 빠른 프로세서를 구현 할 수 있을 것으로 판단된다.

  • PDF