Differential equations for hash functions from MDx-family
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 51-53.

Voir la notice de l'article provenant de la source Math-Net.Ru

Creating a hash function cryptographers almost never prove the selection of algorithmic blocks, the order of blocks. The hash-function HAVAL proposed in 1992 is probably the only exception from this rule.This hash-function is constructed of blocks with specific properties such as strong independence of output bits, strong avalanche effect, 0-1 balance and others for Boolean functions, and the result hash function was proposed to be cryptographically strong. But time had shown that it is not true. The papers, proposing other popular hash-functions such as MD4, MD5, SHA-0, SHA-1, SHA-2, RIPEMD, GOST 34.11-94 and others, do not contain any proof for choice of elements. The algorithms used in construction of the hash-family of MDx contain constant values, addition modulo $2^{32}$, rotations and primitive Boolean functions, chosen by the author. The cryptanalytics almost had not undertaken yet any attempts to prove the choice of elements and if it is possible to change them to improve the cryptographic properties of the algorithm. The main target of this paper is an analysis of how primitive Boolean functions and rotations influence the resistance of MD5 to differential attacks.
@article{PDMA_2012_5_a26,
     author = {S. D. Loshkaryov},
     title = {Differential equations for hash functions from {MDx-family}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {51--53},
     publisher = {mathdoc},
     number = {5},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a26/}
}
TY  - JOUR
AU  - S. D. Loshkaryov
TI  - Differential equations for hash functions from MDx-family
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2012
SP  - 51
EP  - 53
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a26/
LA  - ru
ID  - PDMA_2012_5_a26
ER  - 
%0 Journal Article
%A S. D. Loshkaryov
%T Differential equations for hash functions from MDx-family
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2012
%P 51-53
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2012_5_a26/
%G ru
%F PDMA_2012_5_a26
S. D. Loshkaryov. Differential equations for hash functions from MDx-family. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 51-53. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a26/

[1] Rivest R., “The MD4 message digest algorithm”, LNCS, 537, 1991, 303–311 | Zbl

[2] Rivest R., “The MD5 message digest algorithm”, RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992

[3] Nguen T. Kh., Karpunin G. A., “Optimalnost vybora funktsii xor v odnoi modeli differentsialnogo kriptoanaliza khesh-funktsii semeistva MDx”, Materialy IV Mezhdunar. nauchn. konf. po problemam bezopasnosti i protivodeistviya terrorizmu i VII Obscheros. nauchn. konf. “Matematika i bezopasnost informatsionnykh tekhnologii”, MABiT–2008 (Moskva, MGU, 30 oktyabrya – 1 noyabrya 2008 g.), MTsNMO, M., 2009, 65–70