MD4 and MD5 are the initial members of the MD4 type hash functions. Both were designed by Rivest [1, 2]. They take variable length input messages and hash them to fixed-length outputs. Both operate on 512-bit message blocks divided into 32-bit words and produce a message digest of 128 bits. First, the message is padded according to the so-called Merkle-Damgård strengthening technique (see hash functionsfor more details). Next, the message is processed block by block by the underlying compression function. This function initializes four 32-bit chaining variables to a fixed value prior to hashing the first message block, and to the current hash value for the following message blocks. Each step of the compression function updates in turn one of the chaining variables according to one message word. Both compression functions are organised into rounds of 16 steps each. MD4 has three such rounds, while MD5 consists of 4 rounds. In each round every message word is used just once in updating...
References
Rivest, R.L. (1991). “The MD4 message digest algorithm.” Advances in Cryptology—CRYPTO'90, Lecture Notes in Computer Science, vol. 537, ed. S. Vanstone. Springer-Verlag, Berlin, 303–311.
Rivest, R.L. (1992). “The MD5 message-digest algorithm.” Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force.
den Boer, B. and A. Bosselaers (1992). “An attack on the last two rounds of MD4.” Advances in Cryptology—CRYPTO'91, Lecture Notes in Computer Science, vol. 576, ed. J. Feigenbaum. Springer-Verlag, Berlin, 194–203.
den Boer, B. and A. Bosselaers (1994). “Collisions for the compression function of MD5.” Advances in Cryptology—EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, ed. T. Helleseth. Springer-Verlag, Berlin, 293–304.
Dobbertin, H. (1998). “Cryptanalysis of MD4.” Journal of Cryptology, 11 (4), 253–271. See also Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, ed. D. Gollmann. Springer-Verlag, Berlin, 1996, 53–69.
Dobbertin, H. (1996). “The status of MD5 after a recent attack.” Cryptobytes, 2 (2), 1–6.
van Oorschot P.C. and M. Wiener (1999). “Parallel collision search with cryptanalytic applications.” Journal of Cryptology, 12 (1), 1–28.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Bosselaers, A. (2005). Md4-Md5. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_249
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_249
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering