< draft-turner-md5-seccon-update-05.txt   draft-turner-md5-seccon-update-06.txt >
Network Working Group S. Turner Network Working Group S. Turner
Internet Draft IECA Internet Draft IECA
Updates: 1321, 2104 (once approved) L. Chen Updates: 1321, 2104 (once approved) L. Chen
Intended Status: Informational NIST Intended Status: Informational NIST
Expires: April 20, 2011 October 20, 2010 Expires: April 25, 2011 October 25, 2010
Updated Security Considerations for the Updated Security Considerations for the
MD5 Message-Digest and the HMAC-MD5 Algorithms MD5 Message-Digest and the HMAC-MD5 Algorithms
draft-turner-md5-seccon-update-05.txt draft-turner-md5-seccon-update-06.txt
Abstract Abstract
This document updates the security considerations for the MD5 message This document updates the security considerations for the MD5 message
digest algorithm. It also updates the security considerations for digest algorithm. It also updates the security considerations for
HMAC-MD5. HMAC-MD5.
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
skipping to change at page 1, line 41 skipping to change at page 1, line 41
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 20, 2011. This Internet-Draft will expire on April 25, 2011.
Copyright Notice Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 34 skipping to change at page 2, line 34
[HMAC] defined a mechanism for message authentication using [HMAC] defined a mechanism for message authentication using
cryptographic hash functions. Any message digest algorithm can be cryptographic hash functions. Any message digest algorithm can be
used, but the cryptographic strength of HMAC depends on the used, but the cryptographic strength of HMAC depends on the
properties of the underlying hash function. [HMAC-MD5] defined test properties of the underlying hash function. [HMAC-MD5] defined test
cases for HMAC-MD5. This document updates the security cases for HMAC-MD5. This document updates the security
considerations in [HMAC-MD5]. considerations in [HMAC-MD5].
[HASH-Attack] summarizes the use of hashes in many protocols and [HASH-Attack] summarizes the use of hashes in many protocols and
discusses how attacks against a message digest algorithm's one-way discusses how attacks against a message digest algorithm's one-way
and collision-free properties affect and do not affect Internet and collision-free properties affect and do not affect Internet
protocols. protocols. Familiarity with [HASH-Attack] is assumed.
2. Security Considerations 2. Security Considerations
MD5 was published in 1992 as an Informational RFC. Since that time, MD5 was published in 1992 as an Informational RFC. Since that time,
MD5 has been studied extensively. What follows are recent attacks MD5 has been studied extensively. What follows are recent attacks
against MD5's collisions, pre-image, and second pre-image resistance. against MD5's collisions, pre-image, and second pre-image resistance.
Additionally, attacks against MD5 used in message authentication with Additionally, attacks against MD5 used in message authentication with
a shared secret (i.e., HMAC-MD5) are discussed. a shared secret (i.e., HMAC-MD5) are discussed.
Some may find the guidance for key lengths and algorithm strengths in Some may find the guidance for key lengths and algorithm strengths in
 End of changes. 4 change blocks. 
4 lines changed or deleted 4 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/