Cryptanalysis of MD2

8Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper considers the hash function MD2 which was developed by Ron Rivest in 1989. Despite its age, MD2 has withstood cryptanalytic attacks until recently. This paper contains the state-of-the-art cryptanalytic results on MD2, in particular collision and preimage attacks on the full hash function, the latter having complexity 2 73, which should be compared to a brute-force attack of complexity 2 128. © 2009 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Knudsen, L. R., Mathiassen, J. E., Muller, F., & Thomsen, S. S. (2010). Cryptanalysis of MD2. Journal of Cryptology, 23(1), 72–90. https://doi.org/10.1007/s00145-009-9054-1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free