Skip to main content
  • 291 Accesses

MD4 and MD5 are the initial members of the MD4 type hash functions. Both were designed by Rivest [1, 2]. They take variable length input messages and hash them to fixed-length outputs. Both operate on 512-bit message blocks divided into 32-bit words and produce a message digest of 128 bits. First, the message is padded according to the so-called Merkle-Damgård strengthening technique (see hash functionsfor more details). Next, the message is processed block by block by the underlying compression function. This function initializes four 32-bit chaining variables to a fixed value prior to hashing the first message block, and to the current hash value for the following message blocks. Each step of the compression function updates in turn one of the chaining variables according to one message word. Both compression functions are organised into rounds of 16 steps each. MD4 has three such rounds, while MD5 consists of 4 rounds. In each round every message word is used just once in updating...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Rivest, R.L. (1991). “The MD4 message digest algorithm.” Advances in Cryptology—CRYPTO'90, Lecture Notes in Computer Science, vol. 537, ed. S. Vanstone. Springer-Verlag, Berlin, 303–311.

    Google Scholar 

  2. Rivest, R.L. (1992). “The MD5 message-digest algorithm.” Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force.

    Google Scholar 

  3. den Boer, B. and A. Bosselaers (1992). “An attack on the last two rounds of MD4.” Advances in Cryptology—CRYPTO'91, Lecture Notes in Computer Science, vol. 576, ed. J. Feigenbaum. Springer-Verlag, Berlin, 194–203.

    Google Scholar 

  4. den Boer, B. and A. Bosselaers (1994). “Collisions for the compression function of MD5.” Advances in Cryptology—EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, ed. T. Helleseth. Springer-Verlag, Berlin, 293–304.

    Google Scholar 

  5. Dobbertin, H. (1998). “Cryptanalysis of MD4.” Journal of Cryptology, 11 (4), 253–271. See also Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, ed. D. Gollmann. Springer-Verlag, Berlin, 1996, 53–69.

    Article  MATH  Google Scholar 

  6. Dobbertin, H. (1996). “The status of MD5 after a recent attack.” Cryptobytes, 2 (2), 1–6.

    MathSciNet  Google Scholar 

  7. van Oorschot P.C. and M. Wiener (1999). “Parallel collision search with cryptanalytic applications.” Journal of Cryptology, 12 (1), 1–28.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Bosselaers, A. (2005). Md4-Md5. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_249

Download citation

Publish with us

Policies and ethics