SlideShare a Scribd company logo
Implementation of rainbow tables
to crack MD5 codes
Presented by: BOUKREDIMI Khadidja
2015/2016
20/04/2016 Information Security 2
Outlines
1. Introduction to Hash functions
2. Message Digest 5 (MD5)
3. Applications
4. MD5 collision
5. Implementation of MD5 in Java
6. Attacks on MD5
7. Rainbow tables
8. How rainbow tables work?
9. Conclusion
20/04/2016 Information Security 3
Introduction to Hash functions
Hash functions are third type of cryptography.
Hash  functions  generate  short­length  strings  from 
arbitrary length input message.
20/04/2016 Information Security 4
Introduction to Hash functions
Hash functions have three fundamental properties:
It must be able to easily convert digital information 
(message) into a fixed length value.
It must be computationally impossible to find two 
files to have the same hash.
It must be computationally impossible to derive any 
information about the input message from just the 
hash.
Note:  the  main  difference  between  hashing  and 
encryption is that a hash is not reversible.
20/04/2016 Information Security 5
Message Digest 5 (MD5)
MD5 is a hash function that was developed in 1991 
by Ronald Rivest.
MD5  produces  a  128­bit  (16  byte)  hash  value, 
typically  expressed  in  text  format  as  a  32  digit 
hexadecimal number.
20/04/2016 Information Security 6
Applications
MD5  is  used  to  verify  file  integrity  and  to  encrypt 
passwords
Verification of file integrity
File  servers  often  provide  a  pre­computed  MD5       
checksum  for  the  file,  so  the  user  can  compare  the 
checksum of the downloaded file to it.
20/04/2016 Information Security 7
Applications
Passwords encryption
A more secure way is to store a 
hash  of  the  password,  rather 
than the password itself.
20/04/2016 Information Security 8
MD5 collision
A collision is when there are two files with the same 
hash.  The  first  practical  collisions  on  MD5  were  in 
2004 by Wang, Feng, Lai and Yu.
20/04/2016 Information Security 9
Implementation of MD5 in Java
20/04/2016 Information Security 10
Attacks on MD5
Rainbow tables
A  rainbow  table  is  a  pre­computed  tables  for 
reversing cryptographic hash functions.
A  rainbow  table  makes  brute  forcing  a  password 
hash  much  easier,  by  removing  the  most 
computationally complicated part of a brute force.
The values are already computed, it's simplified to 
just a simple search­and­compare operation on the 
table.
20/04/2016 Information Security 11
How rainbow tables work?
Rainbow tables use reduction and hash functions.
A  hash  function  maps  plaintexts  to  hashes,  the 
reduction function maps hashes to plaintexts.
There are two methods to find a given plaintext:
Hash  each  plaintext  one  by  one,  until  we  find  the 
hash
Hash  each  plaintext  one  by  one,  but  store  each 
generated hash in a stored table so that we can easily 
look the hash up later without generating the hashes 
again.
20/04/2016 Information Security 12
How rainbow tables work?
20/04/2016 Information Security 13
Conclusion
Password  storage  is  one  important  aspect  of  data 
security.
MD5  is  used  for  encrypting  plaintext  passwords  into 
strings  that  theoretically  can't  be  deciphered  due  to 
their one­way encryption feature.
Rainbow  tables  are  the  new  generation  of  cracking, 
using advanced method for cracking passwords.
There were improvement on MD5 processing by adding 
salt  value,  which  makes  passwords  more  resistant  to 
rainbow tables.
20/04/2016 Information Security 14
References
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu. 
Collisions for Hash Functions MD4, MD5, HAVAL­128 and 
RIPEMD. Cryptology ePrint Archive, Report 2004/199, 2004. 
http://eprint.iacr.org/.
Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other
Hash Functions. In Ronald Cramer, editor, Advances in 
Cryptology­EUROCRYPT 2005, volume 3494 of Lecture Notes 
in Computer Science, pages 19–35. Springer, 2005.
Rivest, R., The MD4 Message Digest Algorithm, RFC 1320, 
MIT and RSA Data Security, Inc., April 1992.
20/04/2016 Information Security 15
References
Mary Cindy Ah Kioon, Zhao Shun Wang and Shubra Deb Das.
Security Analysis of MD5 algorithm in Password Storage, 2013, 
pages 4.
Praveen Gauravaram, Adrian McCullagh and ED Dawson. 
Collision Attacks on MD5 and SHA­1: Is this the “Sword of 
Damocles” for Electronic Commerce?, 2006, pages 73­88.
WarpBoy. Rainbow tables explained, 2006, pages 11.
source URL: https://en.wikipedia.org/wiki/Rainbow_table, 
April 16 th , 2016, visited 18/04/2016.
Questions

More Related Content

Similar to implementation of rainbow tables to crack md5 codes

Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
 
A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
Mj2521372142
Mj2521372142Mj2521372142
Mj2521372142
IJERA Editor
 
Hash Function
Hash FunctionHash Function
Hash Function
stalin rijal
 
Md5
Md5Md5
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
ssuser5297f5
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
Harry Potter
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
James Wong
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
Luis Goldster
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
David Hoen
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
Fraboni Ec
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
Young Alista
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
Tony Nguyen
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
ijsrd.com
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography Assignment
Ashik Iqbal
 

Similar to implementation of rainbow tables to crack md5 codes (20)

Message digest 5
Message digest 5Message digest 5
Message digest 5
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 
A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
 
Mj2521372142
Mj2521372142Mj2521372142
Mj2521372142
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Md5
Md5Md5
Md5
 
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography Assignment
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 

implementation of rainbow tables to crack md5 codes

  • 1. Implementation of rainbow tables to crack MD5 codes Presented by: BOUKREDIMI Khadidja 2015/2016
  • 2. 20/04/2016 Information Security 2 Outlines 1. Introduction to Hash functions 2. Message Digest 5 (MD5) 3. Applications 4. MD5 collision 5. Implementation of MD5 in Java 6. Attacks on MD5 7. Rainbow tables 8. How rainbow tables work? 9. Conclusion
  • 3. 20/04/2016 Information Security 3 Introduction to Hash functions Hash functions are third type of cryptography. Hash  functions  generate  short­length  strings  from  arbitrary length input message.
  • 4. 20/04/2016 Information Security 4 Introduction to Hash functions Hash functions have three fundamental properties: It must be able to easily convert digital information  (message) into a fixed length value. It must be computationally impossible to find two  files to have the same hash. It must be computationally impossible to derive any  information about the input message from just the  hash. Note:  the  main  difference  between  hashing  and  encryption is that a hash is not reversible.
  • 5. 20/04/2016 Information Security 5 Message Digest 5 (MD5) MD5 is a hash function that was developed in 1991  by Ronald Rivest. MD5  produces  a  128­bit  (16  byte)  hash  value,  typically  expressed  in  text  format  as  a  32  digit  hexadecimal number.
  • 6. 20/04/2016 Information Security 6 Applications MD5  is  used  to  verify  file  integrity  and  to  encrypt  passwords Verification of file integrity File  servers  often  provide  a  pre­computed  MD5        checksum  for  the  file,  so  the  user  can  compare  the  checksum of the downloaded file to it.
  • 7. 20/04/2016 Information Security 7 Applications Passwords encryption A more secure way is to store a  hash  of  the  password,  rather  than the password itself.
  • 8. 20/04/2016 Information Security 8 MD5 collision A collision is when there are two files with the same  hash.  The  first  practical  collisions  on  MD5  were  in  2004 by Wang, Feng, Lai and Yu.
  • 9. 20/04/2016 Information Security 9 Implementation of MD5 in Java
  • 10. 20/04/2016 Information Security 10 Attacks on MD5 Rainbow tables A  rainbow  table  is  a  pre­computed  tables  for  reversing cryptographic hash functions. A  rainbow  table  makes  brute  forcing  a  password  hash  much  easier,  by  removing  the  most  computationally complicated part of a brute force. The values are already computed, it's simplified to  just a simple search­and­compare operation on the  table.
  • 11. 20/04/2016 Information Security 11 How rainbow tables work? Rainbow tables use reduction and hash functions. A  hash  function  maps  plaintexts  to  hashes,  the  reduction function maps hashes to plaintexts. There are two methods to find a given plaintext: Hash  each  plaintext  one  by  one,  until  we  find  the  hash Hash  each  plaintext  one  by  one,  but  store  each  generated hash in a stored table so that we can easily  look the hash up later without generating the hashes  again.
  • 12. 20/04/2016 Information Security 12 How rainbow tables work?
  • 13. 20/04/2016 Information Security 13 Conclusion Password  storage  is  one  important  aspect  of  data  security. MD5  is  used  for  encrypting  plaintext  passwords  into  strings  that  theoretically  can't  be  deciphered  due  to  their one­way encryption feature. Rainbow  tables  are  the  new  generation  of  cracking,  using advanced method for cracking passwords. There were improvement on MD5 processing by adding  salt  value,  which  makes  passwords  more  resistant  to  rainbow tables.
  • 14. 20/04/2016 Information Security 14 References Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu.  Collisions for Hash Functions MD4, MD5, HAVAL­128 and  RIPEMD. Cryptology ePrint Archive, Report 2004/199, 2004.  http://eprint.iacr.org/. Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other Hash Functions. In Ronald Cramer, editor, Advances in  Cryptology­EUROCRYPT 2005, volume 3494 of Lecture Notes  in Computer Science, pages 19–35. Springer, 2005. Rivest, R., The MD4 Message Digest Algorithm, RFC 1320,  MIT and RSA Data Security, Inc., April 1992.
  • 15. 20/04/2016 Information Security 15 References Mary Cindy Ah Kioon, Zhao Shun Wang and Shubra Deb Das. Security Analysis of MD5 algorithm in Password Storage, 2013,  pages 4. Praveen Gauravaram, Adrian McCullagh and ED Dawson.  Collision Attacks on MD5 and SHA­1: Is this the “Sword of  Damocles” for Electronic Commerce?, 2006, pages 73­88. WarpBoy. Rainbow tables explained, 2006, pages 11. source URL: https://en.wikipedia.org/wiki/Rainbow_table,  April 16 th , 2016, visited 18/04/2016.