<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=MD4</id>
	<title>MD4 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=MD4"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=MD4&amp;action=history"/>
	<updated>2026-05-15T09:38:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=MD4&amp;diff=2437&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;The '''MD4 Message-Digest Algorithm''' is a cryptographic hash function developed by Ronald Rivest in 1990. The digest length is 128 bits. The algorithm has influenced...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=MD4&amp;diff=2437&amp;oldid=prev"/>
		<updated>2019-03-22T03:47:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;The &amp;#039;&amp;#039;&amp;#039;MD4 Message-Digest Algorithm&amp;#039;&amp;#039;&amp;#039; is a &lt;a href=&quot;/Cryptographic_hash_function&quot; title=&quot;Cryptographic hash function&quot;&gt;cryptographic hash function&lt;/a&gt; developed by &lt;a href=&quot;/index.php?title=Ronald_Rivest&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Ronald Rivest (page does not exist)&quot;&gt;Ronald Rivest&lt;/a&gt; in 1990. The digest length is 128 bits. The algorithm has influenced...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;The '''MD4 Message-Digest Algorithm''' is a [[cryptographic hash function]] developed by [[Ronald Rivest]] in 1990. The digest length is 128 bits. The algorithm has influenced later designs, such as the [[MD5]], [[SHA-1]] and [[RIPEMD]] algorithms. The acronym &amp;quot;MD&amp;quot; stands for &amp;quot;Message Digest.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The security of MD4 has been severely compromised. The first full [[collision attack]] against MD4 was published in 1995 and several newer attacks have been published since then. As of 2007, an attack can generate collisions in less than 2 MD4 hash operations.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
Weaknesses in MD4 were demonstrated by Den Boer and Bosselaers in a paper published in 1991. The first full-round MD4 [[collision attack]] was found by [[Hans Dobbertin]] in 1995, which took only seconds to carry out at that time. In August 2004, [[Wang Xiaoyun|Wang]] et al. found a very efficient collision attack, alongside attacks on later hash function designs in the MD4/MD5/SHA-1/RIPEMD family. This result was improved later by Sasaki et al., and generating a collision is now as cheap as verifying it (a few microseconds). In 2011, RFC 6150 stated that RFC 1320 (MD4) is '''historic''' (obsolete).&lt;br /&gt;
&lt;br /&gt;
==MD4 hashes==&lt;br /&gt;
The 128-bit (16-byte) MD4 hashes (also termed ''message digests'') are typically represented as 32-digit [[hexadecimal]] numbers. The following demonstrates a 43-byte [[ASCII]] input and the corresponding MD4 hash:&lt;br /&gt;
&lt;br /&gt;
 MD4(&amp;quot;The quick brown fox jumps over the lazy og&amp;quot;)&lt;br /&gt;
 = 1bee69a46ba811185c194762abaeae90&lt;br /&gt;
&lt;br /&gt;
Even a small change in the message will (with overwhelming probability) result in a completely different hash, e.g. changing &amp;lt;tt&amp;gt;d&amp;lt;/tt&amp;gt; to &amp;lt;tt&amp;gt;c&amp;lt;/tt&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 MD4(&amp;quot;The quick brown fox jumps over the lazy og&amp;quot;)&lt;br /&gt;
 = b86e130ce7028da59e672d56ad0113df&lt;br /&gt;
&lt;br /&gt;
The hash of the zero-length string is:&lt;br /&gt;
&lt;br /&gt;
 MD4(&amp;quot;&amp;quot;) = 31d6cfe0d16ae931b73c59d7e0c089c0&lt;br /&gt;
&lt;br /&gt;
==MD4 test vectors==&lt;br /&gt;
The following test vectors are defined in RFC 1320 (The MD4 Message-Digest Algorithm)&lt;br /&gt;
&lt;br /&gt;
 MD4 (&amp;quot;&amp;quot;) = 31d6cfe0d16ae931b73c59d7e0c089c0&lt;br /&gt;
 MD4 (&amp;quot;a&amp;quot;) = bde52cb31de33e46245e05fbdbd6fb24&lt;br /&gt;
 MD4 (&amp;quot;abc&amp;quot;) = a448017aaf21d8525fc10ae87aa6729d&lt;br /&gt;
 MD4 (&amp;quot;message digest&amp;quot;) = d9130a8164549fe818874806e1c7014b&lt;br /&gt;
 MD4 (&amp;quot;abcdefghijklmnopqrstuvwxyz&amp;quot;) = d79e1c308aa5bbcdeea8ed63df412da9&lt;br /&gt;
 MD4 (&amp;quot;ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789&amp;quot;) = 043f8582f241db351ce627e153e7f0e4&lt;br /&gt;
 MD4 (&amp;quot;12345678901234567890123456789012345678901234567890123456789012345678901234567890&amp;quot;) = e33b4ddc9c38f2199c3e7b164fcc0536&lt;br /&gt;
&lt;br /&gt;
==MD4 collision example==&lt;br /&gt;
Let:&lt;br /&gt;
 k1 = 839c7a4d7a92cb678a5d59eea5a7573c8a74deb366c3dc20a083b69f5d2a3bb3719dc69891e9f95e809fd7e8b23ba6318ed45e51fe39708bf9427e9c3e8b9&lt;br /&gt;
 k2 = 839c7a4d7a92cb678a5d59eea5a7573c8a74deb366c3dc20a083b69f5d2a3bb3719dc69891e9f95e809fd7e8b23ba6318ed45e51fe39708bf9427e9c3e8b9&lt;br /&gt;
&lt;br /&gt;
k1 ≠ k2, but MD4(k1) = MD4(k2) = 4d7e6a1defa93d2dde05b45d864c429b&lt;br /&gt;
&lt;br /&gt;
Note that two hex-digits of k1 and k2 define one byte of the input string, whose length is 64 bytes .&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Hash function security summary]]&lt;br /&gt;
* [[Comparison of cryptographic hash functions]]&lt;br /&gt;
* [[MD2 (cryptography)|MD2]]&lt;br /&gt;
* [[MD5]]&lt;br /&gt;
* [[MD6]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>