| < draft-turner-md5-seccon-update-05.txt | draft-turner-md5-seccon-update-06.txt > | |||
|---|---|---|---|---|
| Network Working Group S. Turner | Network Working Group S. Turner | |||
| Internet Draft IECA | Internet Draft IECA | |||
| Updates: 1321, 2104 (once approved) L. Chen | Updates: 1321, 2104 (once approved) L. Chen | |||
| Intended Status: Informational NIST | Intended Status: Informational NIST | |||
| Expires: April 20, 2011 October 20, 2010 | Expires: April 25, 2011 October 25, 2010 | |||
| Updated Security Considerations for the | Updated Security Considerations for the | |||
| MD5 Message-Digest and the HMAC-MD5 Algorithms | MD5 Message-Digest and the HMAC-MD5 Algorithms | |||
| draft-turner-md5-seccon-update-05.txt | draft-turner-md5-seccon-update-06.txt | |||
| Abstract | Abstract | |||
| This document updates the security considerations for the MD5 message | This document updates the security considerations for the MD5 message | |||
| digest algorithm. It also updates the security considerations for | digest algorithm. It also updates the security considerations for | |||
| HMAC-MD5. | HMAC-MD5. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 1, line 41 ¶ | skipping to change at page 1, line 41 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on April 20, 2011. | This Internet-Draft will expire on April 25, 2011. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2010 IETF Trust and the persons identified as the | Copyright (c) 2010 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 34 ¶ | skipping to change at page 2, line 34 ¶ | |||
| [HMAC] defined a mechanism for message authentication using | [HMAC] defined a mechanism for message authentication using | |||
| cryptographic hash functions. Any message digest algorithm can be | cryptographic hash functions. Any message digest algorithm can be | |||
| used, but the cryptographic strength of HMAC depends on the | used, but the cryptographic strength of HMAC depends on the | |||
| properties of the underlying hash function. [HMAC-MD5] defined test | properties of the underlying hash function. [HMAC-MD5] defined test | |||
| cases for HMAC-MD5. This document updates the security | cases for HMAC-MD5. This document updates the security | |||
| considerations in [HMAC-MD5]. | considerations in [HMAC-MD5]. | |||
| [HASH-Attack] summarizes the use of hashes in many protocols and | [HASH-Attack] summarizes the use of hashes in many protocols and | |||
| discusses how attacks against a message digest algorithm's one-way | discusses how attacks against a message digest algorithm's one-way | |||
| and collision-free properties affect and do not affect Internet | and collision-free properties affect and do not affect Internet | |||
| protocols. | protocols. Familiarity with [HASH-Attack] is assumed. | |||
| 2. Security Considerations | 2. Security Considerations | |||
| MD5 was published in 1992 as an Informational RFC. Since that time, | MD5 was published in 1992 as an Informational RFC. Since that time, | |||
| MD5 has been studied extensively. What follows are recent attacks | MD5 has been studied extensively. What follows are recent attacks | |||
| against MD5's collisions, pre-image, and second pre-image resistance. | against MD5's collisions, pre-image, and second pre-image resistance. | |||
| Additionally, attacks against MD5 used in message authentication with | Additionally, attacks against MD5 used in message authentication with | |||
| a shared secret (i.e., HMAC-MD5) are discussed. | a shared secret (i.e., HMAC-MD5) are discussed. | |||
| Some may find the guidance for key lengths and algorithm strengths in | Some may find the guidance for key lengths and algorithm strengths in | |||
| End of changes. 4 change blocks. | ||||
| 4 lines changed or deleted | 4 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||