Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS

insights and immense patience, without which my project would have been impossible to complete. His suggestions and his work in this field helped me tremendously in understanding and working on the topic. Dr. Stamp also provided appropriate research papers, including his own book, which aided me in...

Full description

Bibliographic Details
Main Author: Narayana D Kashyap
Other Authors: The Pennsylvania State University CiteSeerX Archives
Format: Text
Language:English
Published: 2006
Subjects:
MD5
Online Access:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2659
http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf
Description
Summary:insights and immense patience, without which my project would have been impossible to complete. His suggestions and his work in this field helped me tremendously in understanding and working on the topic. Dr. Stamp also provided appropriate research papers, including his own book, which aided me in identifying the areas to concentrate and consequently write a sound project statement. I would also like to thank Dr. Sami Khuri and Prof. David Blockus for agreeing to be the committee members to review and certify my project. Finally, I would like to express my gratitude to Asif, Vinod, Venkat, Bharath, Joshi, Vamsi, Karan, Lakshmi, Amulya, Pavan, Chakki, Manu, my brothers Chythanya and Vinay and all my other friends and family members who have supported me immensely both in technical and moral spheres. i It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision. Vlastimil Klima then proposed a more efficient and faster technique to implement this attack. We use these techniques to first create a collision attack and then use these collisions to implement meaningful collisions by creating two different packages that give identical MD5 hash, but when extracted, each gives out different files with contents specified by the atacker.