Fact-checked by Grok 2 weeks ago
References
-
[1]
RFC 1319: The MD2 Message-Digest Algorithm### Summary of RFC 1319 - The MD2 Message-Digest Algorithm
-
[2]
Cryptanalysis of MD2Among the new attacks, there are the first collision attack breaking the birthday bound on the full. MD2 hash function and also an improved preimage attack on ...
-
[3]
[PDF] An improved preimage attack on MD2 - Cryptology ePrint ArchiveA collision for any hash function can be found by a birthday attack with complexity 2n/2. Preimages and 2nd preimages can be found by a brute force search with ...
-
[4]
RFC 6149 - MD2 to Historic Status - IETF DatatrackerChen Category: Informational NIST ISSN: 2070-1721 March 2011 MD2 ... MD2 is not a reasonable candidate for further standardization and should be deprecated ...
-
[5]
RFC 1319: The MD2 Message-Digest AlgorithmThis document describes the MD2 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit ...
-
[6]
RFC 2313: PKCS #1: RSA Encryption Version 1.5... signatures in PKCS #7. The first signature algorithm (informally, "MD2 with RSA") combines the MD2 message-digest algorithm with RSA, the second (informally ...
-
[7]
draft-hickman-netscape-ssl-00 - IETF Datatracker... used by the client and server during a single connection). The client ... use both MD2 and RSA encryption. Used by SSL for certificate signature ...
-
[8]
RFC 1422: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management### Summary of MD2 Usage in Certificates or PKI from RFC 1422
- [9]
- [10]
-
[11]
NoneNothing is retrieved...<|control11|><|separator|>
-
[12]
Md2 is not Secure Without the Checksum Byte | Designs, Codes and ...In this paper, we propose a low complexity method to find collisions for the compression function of MD2.
-
[13]
The MD2 Hash Function Is Not One-Way | SpringerLinkIn this paper, we show that MD2 does not reach the ideal security level of 2128. We describe preimage attacks against the underlying compression function, the ...<|control11|><|separator|>
-
[14]
Preimage and Collision Attacks on MD2 - SpringerLinkThis paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known ...
-
[15]
An improved preimage attack on MD2 - Cryptology ePrint ArchiveAbstract. This paper describes an improved preimage attack on the cryptographic hash function MD2. The attack has complexity equivalent to about ...Missing: cryptanalysis | Show results with:cryptanalysis
-
[16]
Cryptanalysis of MD2 | Journal of CryptologyOct 28, 2009 · This paper contains the state-of-the-art cryptanalytic results on MD2, in particular collision and preimage attacks on the full hash function.Missing: partial | Show results with:partial
-
[17]
RFC 1423: Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers### Summary of MD2 Usage in PEM or Certificates (RFC 1423)
-
[18]
An update that introduces the MD2 and MD4 hashing algorithm ...An update is available that changes the behavior of the CertGetCertificateChain function in Windows Embedded Compact 7 to disable MD2 or MD4 for all requested ...
-
[19]
Cryptographic weakness due to MD2 hash usage in PyCryptodomeThe MD2 hash algorithm is cryptographically broken and vulnerable to collision attacks. MD2 lacks collision resistance, making it possible for attackers to ...
-
[20]
MD2: hash-collision scare of the day - Random OracleSep 24, 2009 · That means a second preimage collision is necessary; simple birthday attacks will not work. Finding a second message that hashes to a given one ...<|control11|><|separator|>
-
[21]
RHSA-2010:0054 - Security Advisory - Red Hat Customer PortalJan 19, 2010 · malicious certificate that would be treated as trusted by a browser. OpenSSL now disables the use of the MD2 algorithm inside signatures by
- [22]