*一方å‘ãƒãƒƒã‚·ãƒ¥é–¢æ•°ã®è¡çªå•題ã«é–¢ã™ã‚‹æƒ…å ± [#ze1ecf1a] 皆様ã‹ã‚‰ã®æƒ…å ±ã‚’ãŠå¾…ã¡ã—ã¦ã„ã¾ã™ã€‚ æƒ…å ±ã¯ãŠæ°—è»½ã«æ›¸ãã“ã‚“ã§ã„ã£ã¦ãã ã•ã„。 #contents **ä¸€æ¬¡æƒ…å ±ã¾ãŸã¯ãƒ‹ãƒ¥ãƒ¼ã‚¹è¨˜äº‹ [#j76e79fb] -[[Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD (Cryptology ePrint Archive):http://eprint.iacr.org/2004/199/]] (August 16-17, 2004) -[[CRYPTO'04 rump session program (PDF):http://www.iacr.org/conferences/crypto2004/C04RumpAgenda.pdf]] -[[NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1 (PDF):http://csrc.nist.gov/hash_standards_comments.pdf]] -[[æš—å·ã‚¢ãƒ«ã‚´ãƒªã‚ºãƒ ã«é‡å¤§ãªæ¬ 陥発見ã®å ±å‘Šç›¸æ¬¡ã:http://japan.cnet.com/news/sec/story/0,2000050480,20070525,00.htm]] -[[SHA-0ã€MD5〠MD4ã«ã‚³ãƒªã‚¸ãƒ§ãƒ³ç™ºè¦‹ã€reduced SHA-1ã‚‚:http://slashdot.jp/article.pl?sid=04/08/18/0257220]] -[[今ã“ãæ–°ã—ã„æš—å·åŒ–標準ãŒå¿…è¦ã (ブルース・シュナイアーæ°ã«ã‚ˆã‚‹ã‚³ãƒ©ãƒ ):http://www.itmedia.co.jp/anchordesk/articles/0408/20/news063.html]] -[[Centeraã¯ã€ŒMD5ã®æ¬ 陥ã«ã‚ˆã‚‹å½±éŸ¿ã‚’å—ã‘ãªã„ã€ã¨ä¸»å¼µã™ã‚‹EMC:http://www.itmedia.co.jp/enterprise/articles/0408/24/news081.html]] -[[Collisions for SHA0, MD5, HAVAL, MD4, and RIPEMD, but SHA1 still secure (RSA lab):http://www.rsasecurity.com/rsalabs/node.asp?id=2738]] (August 31, 2004) -[[ãƒãƒƒã‚·ãƒ¥é–¢æ•°SHA-1åŠã³RIPEMD-160ã®å®‰å…¨æ€§ã«ã¤ã„㦠(CRYPTREC):http://www.ipa.go.jp/security/enc/CRYPTREC/fy16/cryptrec20040914_report01.html]] --[[ãƒãƒƒã‚·ãƒ¥é–¢æ•°SHA-1åŠã³RIPEMD-160ã®å®‰å…¨æ€§ã«ã¤ã„㦠(CRYPTREC):http://www2.nict.go.jp/ns/s801/102/fy16/cryptrec20040914_SHAcomment.htm]] -[[CRYPTO2004 レãƒãƒ¼ãƒˆ (SoftwareDesign2004å¹´11月å·) :http://h2np.net/docs/crypto2004.html]] -[[GnuPG stable 1.4 released:http://lists.gnupg.org/pipermail/gnupg-announce/2004q4/000186.html]] (Dec. 2004) --"SHA256, SHA384, and SHA512 hashes are now supported for read and write. ...the revised OpenPGP standard removes support for several unused or mostly unused hashes" -[[MD5 To Be Considered Harmful Someday:http://www.st.ryukoku.ac.jp/~kjm/security/ml-archive/bugtraq/2004.12/msg00050.html]] -[[Collision Search Attacks on SHA1:http://theory.csail.mit.edu/~yiqun/shanote.pdf]] (February 13, 2005) -[[NIST Brief Comments on Recent Cryptanalytic Attacks on SHA-1:http://csrc.nist.gov/news-highlights/NIST-Brief-Comments-on-SHA1-attack.pdf]] (PDF, 2/18/2005) -[[æš—å·é€šä¿¡ãªã©ã«ç”¨ã„られる「SHA-1ã€ã®æ”»æ’ƒã‚’容易ã«ã™ã‚‹ç ”ç©¶ãŒå…¬è¡¨:http://internet.watch.impress.co.jp/cda/news/2005/02/22/6541.html]] -[[Colliding X.509 Certificates:http://www.win.tue.nl/~bdeweger/CollidingCertificates/]] (March 1, 2005) -[[Colliding X.509 Certificates (Cryptology ePrint Archive):http://eprint.iacr.org/2005/067]] (March 1, 2005) -[[Finding MD5 Collisions – a Toy For a Notebook (Cryptology ePrint Archive):http://eprint.iacr.org/2005/075]] (March 5, 2005) -[[How to Break MD5 and Other Hash Functions:http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf]] (PDF) -[[Cryptanalysis of the Hash Functions MD4 and RIPEMD:http://www.infosec.sdu.edu.cn/paper/md4-ripemd-attck.pdf]] (PDF) -[[CRYPTREC Report 2004 (April 19, 2005):http://cryptrec.nict.go.jp/fy16/cryptrec20050331_c04report.htm]] -[[ãƒãƒƒã‚·ãƒ¥é–¢æ•°ã«é–¢ã™ã‚‹ç ”ç©¶å‹•å‘ã«ã¤ã„㦠(CRYPTREC, April 20, 2005):http://www.ipa.go.jp/security/enc/CRYPTREC/fy17/cryptrec20050420_report01.html]] -[[Improved Collision Attack on MD4:http://eprint.iacr.org/2005/151]](ePrint-2005/05/20) --[[Wang(2004):http://eprint.iacr.org/2004/199]]ã«ã‚ˆã‚‹MD4ã‚³ãƒªã‚¸ãƒ§ãƒ³ç™ºè¦‹æ‰‹æ³•ã®æ”¹è‰¯ã€‚電気通信大å¦[[太田・國廣 ç ”ç©¶å®¤:http://ota-pc.ice.uec.ac.jp/]]ã«ã‚ˆã‚‹ã€‚ -[[Attacking Hash Functions by Poisoned Messages "The Story of Alice and her Boss":http://www.cits.rub.de/MD5Collisions/]] -[[Finding Collisions in the Full SHA-1:http://www.infosec.sdu.edu.cn/paper/sha1-crypto-auth-new-2-yao.pdf]] (PDF) -[[Wang's sufficient conditions of MD5 are not sufficient:http://eprint.iacr.org/2005/263]] -[[ITmediaãƒ‹ãƒ¥ãƒ¼ã‚¹ï¼šè„†å¼±ãªæš—å·åŒ–アルゴリズムãŒå‘¼ã¶æ‡¸å¿µ:http://www.itmedia.co.jp/news/articles/0511/02/news016.html]] -[[米政府〠SHA-1ã«ä»£ã‚ã‚‹æš—å·ã‚¢ãƒ«ã‚´ãƒªã‚ºãƒ ã®æ–°æ¨™æº–ç–定を検討 - CNET Japan:http://japan.cnet.com/news/sec/story/0,2000050480,20090227,00.htm]] -[[japan.linux.com | ã‚»ã‚ュリティã®å¤§å¾¡æ‰€ãŒé›†ã¾ã‚Šã€ä»£æ›¿æš—å·æ³•を話ã—åˆã†:http://japan.linux.com/security/05/11/08/0213251.shtml?topic=1]] **日記/Weblog ç‰ã«ã‚ˆã‚‹æƒ…å ± [#bebb1951] -[[SHA-1 Break Rumored (Felten教授ã®blog, August 16-17-18, 2004):http://www.freedom-to-tinker.com/archives/000661.html]] -[[「計算機暗å·å±‹æ—¥è¨˜ã€ 8月17-25æ—¥ã®è¨˜äº‹:http://flu.hn.org/~maro/j/diary/0408.html]] -[[「Educated Guesswork〠8月16-19æ—¥:http://www.rtfm.com/movabletype/archives/2004_08.html]] -[[ã•ã£ãã€ãã®ä¼šå ´ã‹ã‚‰æˆ»ã£ã¦ãã¾ã—㟠(Slashdot.jp, 8月18-19æ—¥):http://slashdot.jp/comments.pl?sid=203703&cid=607130]] -[[「çµåŸŽæµ©ã®æ—¥è¨˜ã€ 8/19 ã®è¨˜äº‹:http://www.hyuki.com/diary/dia0408.html#i19_03]] -[[「çµåŸŽæµ©ã®æ—¥è¨˜ã€ 8/20 ã®è¨˜äº‹:http://www.hyuki.com/diary/dia0408.html#i20_14]] -[[ãƒãƒƒã‚·ãƒ¥å€¤ã®è¡çªå•題 (Baldanders.info/blog):https://baldanders.info/blog/archives/000048.shtml]] -[[「Radium Software Development〠MD5 Collision:http://www.radiumsoftware.com/0408.html#040820]] -[[SHA-1 Broken (Schneier on Security):http://www.schneier.com/blog/archives/2005/02/sha1_broken.html]] (February 15, 2005) -- full SHA-1 ã‚‚çªç ´ã•れãŸã‚ˆã†ã§ã™ã€‚ -[[Cryptanalysis of SHA-1 (Schneier on Security):http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html]] (February 18, 2005)([[「解èªã•れãŸSHA-1ã€å’Œè¨³:http://itpro.nikkeibp.co.jp/free/ITPro/Security/20050401/158327/]](IT Pro,2005/04/07)) -[[Crypto researchers break SHA-1 (The Register):http://www.theregister.co.uk/2005/02/17/sha1_hashing_broken/]] (17th February 2005) -[[SHA-1ãŒç ´ã‚‰ã‚ŒãŸï¼Ÿ:http://motivate.jp/archives/2005/02/sha1.html]] (æ¦ç”°åœå²ã•ã‚“, 2005å¹´02月16æ—¥) -[[「SHA-1ãŒç ´ã‚‰ã‚ŒãŸã€ã¨è¨€ã†ãƒªã‚µãƒ¼ãƒãƒŽãƒ¼ãƒˆã®ç¾ç‰©:http://motivate.jp/archives/2005/02/sha1_1.html]] (æ¦ç”°åœå²ã•ã‚“, 2005å¹´02月19æ—¥) -[[SHA-1ãŒç ´ã‚‰ã‚ŒãŸï¼Ÿï¼ˆç¶šå ±ï¼‰:http://motivate.jp/archives/2005/02/sha1_2.html]] (æ¦ç”°åœå²ã•ã‚“, 2005å¹´02月19æ—¥) -[[Tiger2 --- with MD5/SHA compatible padding to appear soon:http://www.cs.technion.ac.il/~biham/Reports/Tiger]] (Eli Biham with [[Ross Anderson:http://www.cl.cam.ac.uk/~rja14/]], March 2005) -[[More Hash Function Attacks (Schneier on Security):http://www.schneier.com/blog/archives/2005/03/more_hash_funct.html]] (March 10, 2005) -[[How to Break MD5 and Other Hash Functions (Financial Cryptography):http://www.financialcryptography.com/mt/archives/000394.html]] -[[ãƒãƒƒã‚·ãƒ¥é–¢æ•°ã®ç ´ã‚Šæ–¹:http://motivate.jp/archives/2005/03/post_29.html]] (æ¦ç”°åœå²ã•ã‚“, 2005å¹´03月14æ—¥) -[[New Cryptanalytic Results Against SHA-1 (Schneier on Security):http://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html]] -[[Schneier on Security: NIST Hash Workshop Liveblogging (1):http://www.schneier.com/blog/archives/2005/10/nist_hash_works_1.html]] -[[Schneier on Security: NIST Hash Workshop Liveblogging (2):http://www.schneier.com/blog/archives/2005/10/nist_hash_works_2.html]] -[[Schneier on Security: NIST Hash Workshop Liveblogging (3):http://www.schneier.com/blog/archives/2005/10/nist_hash_works_3.html]] -[[Schneier on Security: NIST Hash Workshop Liveblogging (4):http://www.schneier.com/blog/archives/2005/11/nist_hash_works.html]] -[[Schneier on Security: NIST Hash Workshop Liveblogging (5):http://www.schneier.com/blog/archives/2005/11/nist_hash_works_4.html]] -[[MD5 Collision Generation:http://www.stachliu.com/collisions.html]] (Stach & Liu)