Figure 6: Runtime for reduced-step MD4 + Dobbertin’s at-
tack.
36 and 40 are not in this set that is why constraints
are more numerous and the search space is decreased.
5 CONCLUSIONS
In this paper, we considered second preimage attack
against MD⋆. Our work is based on logical cryptanal-
ysis and described a two phases approach. As a result,
we broke step-reduced instances for both MD4 and
MD5 and improved results in existing practice (See
Table.1). Since many other hash functions like RIPE-
MD, TIGER, SHA-⋆ are built on the same schema as
MD4, our angle of view is hopeful to be generalized.
Indeed, we show an application of SAT as a great tool
to cryptanalyse hash functions. Furthermore, our in-
stance combined with added information led us to be-
lieve we could improve our attack. From our studies
or from the literature about MD⋆, we can adapt and
exploit weaknesses of hash functions to enrich our re-
verse engineering.
Table 1: Practical attacks on step-reduced MD4 and
MD5 second preimage.
Type of CNF In [*] Our attack
MD4 Brute force 28 steps 31 steps
MD4 + info up to 39 steps up to 39 steps
MD5 Brute force 26 steps 28 steps
MD5 + info X X
[*] (De et al., 2007)
REFERENCES
Aumasson, J., Meier, W., and Mendel, F. (2008). Preim-
age attacks on 3-pass haval and step-reduced md5. In
Selected Areas in Cryptography, pages 120–135.
Bacchus, F. and Winter, J. (2003). Effective preprocessing
with hyper-resolution and equality reduction.
Biere, A. (2010). Lingeling, plingeling, picosat and pre-
cosat at sat race 2010. In Tech. Rep. 10/1, FMV Re-
ports Series, Johannes Kepler University, Altenberg-
erstr. Linz, Austria, pages 244–257.
Biere, A., Heljanko, K., Junttila, T., Latvala, T., and Schup-
pan, V. (2006). Linear encodings of bounded LTL
model checking. Logical Methods in Computer Sci-
ence.
Biere, A., Heule, M. J. H., Maaren, H. V., and Walsh, T.,
editors (2009). Handbook of Satisfiability, volume
185 of Frontiers in Artificial Intelligence and Appli-
cations. IOS Press.
Biham, E. and Shamir, A. (1990). Differential cryptanalysis
of des-like cryptosystems. In CRYPTO, pages 2–21.
Cook, S. A. (1971). The Complexity of Theorem Proving
Procedures. In 3
rd
ACM Symp. on Theory of Comput-
ing, Ohio, pages 151–158.
Damg˚ard, I. (1989). A design principle for hash functions.
In CRYPTO, pages 416–427.
Davis, M., Logemann, G., and Loveland, D. (1962). A Ma-
chine Program for Theorem-Proving. Journal Associ-
ation for Computing Machine, (5):394–397.
De, D., Kumarasubramanian, A., and Venkatesan, R.
(2007). Inversion attacks on secure hash functions us-
ing satsolvers. In SAT, pages 377–382.
Dobbertin, H. (1996). Cryptanalysis of md4. In FSE, pages
53–69.
Kautz, H. and Selman, B. (1996). Pushing the envelope:
Planning, propositional logic and stochastic search. In
Proc. of 30th national AI and 8th IAAI.
Kl´ıma, V. (2005). Finding md5 collisions on a notebook pc
using multi-message modifications. In IACR Cryptol-
ogy ePrint Archive, page 102.
Leurent, G. (2008). Md4 is not one-way. In FSE, pages
412–428.
Massacci, F. and Marraro, L. (2000). Logical cryptanalysis
as a sat problem. J.Autom.Reasoning, pages 165–203.
Matsui, M. and Yamagishi, A. (1992). A new method
for known plaintext attack of feal cipher. In EURO-
CRYPT, pages 81–91.
Merkle, R. (1989). One way hash functions and des. In
CRYPTO, pages 428–446.
Mironov, I. and Zhang, L. (2006). Applications of sat
solvers to cryptanalysis of hash functions. In SAT,
pages 102–115.
Potlapally, N. R., Raghunathan, A., Ravi, S., Jha, N. K.,
and Lee, R. B. (2007). Aiding side-channel attacks on
cryptographic software with satisfiability-based anal-
ysis. IEEE Trans. VLSI Syst., 15(4):465–470.
Sasaki, Y. and Aoki, K. (2008). Preimage attacks on step-
reduced md5. In ACISP, pages 282–296.
Wang, X. and Yu, H. (2005). How to break md5 and other
hash functions. In EUROCRYPT, pages 19–35.
Wang, X., Yu, H., Wang, W., Zhang, H., and Zhan, T.
(2009). Cryptanalysis on hmac/nmac-md5 and md5-
mac. In EUROCRYPT, pages 121–133.
Yu, H. and Wang, X. (2007). Multi-collision attack on the
compression functions of md4 and 3-pass haval. In
ICISC, pages 206–226.
Zhang, L., Madigan, C., Moskewicz, M., and Malik, S.
(2001). Efficient conflict driven learning in a boolean
satisfiability solver. In ICCAD, pages 11–16.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
344