Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS

insights and immense patience, without which my project would have been impossible to complete. His suggestions and his work in this field helped me tremendously in understanding and working on the topic. Dr. Stamp also provided appropriate research papers, including his own book, which aided me in...

Full description

Bibliographic Details
Main Author: Narayana D Kashyap
Other Authors: The Pennsylvania State University CiteSeerX Archives
Format: Text
Language:English
Published: 2006
Subjects:
MD5
Online Access:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2659
http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf
id ftciteseerx:oai:CiteSeerX.psu:10.1.1.126.2659
record_format openpolar
spelling ftciteseerx:oai:CiteSeerX.psu:10.1.1.126.2659 2023-05-15T18:12:50+02:00 Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS Narayana D Kashyap The Pennsylvania State University CiteSeerX Archives 2006 application/pdf http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2659 http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf en eng http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2659 http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf Metadata may be used without restrictions as long as the oai identifier remains attached to it. http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf MD5 hash collision Wang attack ii Table of Contents text 2006 ftciteseerx 2016-01-07T14:19:19Z insights and immense patience, without which my project would have been impossible to complete. His suggestions and his work in this field helped me tremendously in understanding and working on the topic. Dr. Stamp also provided appropriate research papers, including his own book, which aided me in identifying the areas to concentrate and consequently write a sound project statement. I would also like to thank Dr. Sami Khuri and Prof. David Blockus for agreeing to be the committee members to review and certify my project. Finally, I would like to express my gratitude to Asif, Vinod, Venkat, Bharath, Joshi, Vamsi, Karan, Lakshmi, Amulya, Pavan, Chakki, Manu, my brothers Chythanya and Vinay and all my other friends and family members who have supported me immensely both in technical and moral spheres. i It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision. Vlastimil Klima then proposed a more efficient and faster technique to implement this attack. We use these techniques to first create a collision attack and then use these collisions to implement meaningful collisions by creating two different packages that give identical MD5 hash, but when extracted, each gives out different files with contents specified by the atacker. Text sami Unknown Lakshmi ENVELOPE(11.699,11.699,-70.766,-70.766) Patience ENVELOPE(-68.933,-68.933,-67.750,-67.750)
institution Open Polar
collection Unknown
op_collection_id ftciteseerx
language English
topic MD5
hash
collision
Wang
attack ii Table of Contents
spellingShingle MD5
hash
collision
Wang
attack ii Table of Contents
Narayana D Kashyap
Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS
topic_facet MD5
hash
collision
Wang
attack ii Table of Contents
description insights and immense patience, without which my project would have been impossible to complete. His suggestions and his work in this field helped me tremendously in understanding and working on the topic. Dr. Stamp also provided appropriate research papers, including his own book, which aided me in identifying the areas to concentrate and consequently write a sound project statement. I would also like to thank Dr. Sami Khuri and Prof. David Blockus for agreeing to be the committee members to review and certify my project. Finally, I would like to express my gratitude to Asif, Vinod, Venkat, Bharath, Joshi, Vamsi, Karan, Lakshmi, Amulya, Pavan, Chakki, Manu, my brothers Chythanya and Vinay and all my other friends and family members who have supported me immensely both in technical and moral spheres. i It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision. Vlastimil Klima then proposed a more efficient and faster technique to implement this attack. We use these techniques to first create a collision attack and then use these collisions to implement meaningful collisions by creating two different packages that give identical MD5 hash, but when extracted, each gives out different files with contents specified by the atacker.
author2 The Pennsylvania State University CiteSeerX Archives
format Text
author Narayana D Kashyap
author_facet Narayana D Kashyap
author_sort Narayana D Kashyap
title Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS
title_short Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS
title_full Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS
title_fullStr Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS
title_full_unstemmed Dedicated to My parents Hema and Datha And my sweet Grandma Ajji ACKNOWLEDGEMENTS
title_sort dedicated to my parents hema and datha and my sweet grandma ajji acknowledgements
publishDate 2006
url http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2659
http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf
long_lat ENVELOPE(11.699,11.699,-70.766,-70.766)
ENVELOPE(-68.933,-68.933,-67.750,-67.750)
geographic Lakshmi
Patience
geographic_facet Lakshmi
Patience
genre sami
genre_facet sami
op_source http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf
op_relation http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2659
http://www.cs.sjsu.edu/faculty/stamp/students/cs298_NKashyap.pdf
op_rights Metadata may be used without restrictions as long as the oai identifier remains attached to it.
_version_ 1766185309301637120