<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Cryptographic hash functions / Key management / Cryptographic protocols / Public key infrastructure / MD5 / X.509 / Public key fingerprint / Collision resistance / MerkleDamgrd construction / SHA-2
Date: 2018-01-29 20:02:27
Cryptography
Public-key cryptography
Cryptographic hash functions
Key management
Cryptographic protocols
Public key infrastructure
MD5
X.509
Public key fingerprint
Collision resistance
MerkleDamgrd construction
SHA-2

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

Add to Reading List

Source URL: infoscience.epfl.ch

Download Document from Source Website

File Size: 1,75 MB

Share Document on Facebook

Similar Documents

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

DocID: 1uBX7 - View Document

Configurare openvpn in zeroshell con Autenticazione mediante password+certificati x.509 Redatto da Claudio Domiziani  ilcon licenza CC BY-SA 4.0 https://creativecommons.org/licenses/by-

Configurare openvpn in zeroshell con Autenticazione mediante password+certificati x.509 Redatto da Claudio Domiziani ilcon licenza CC BY-SA 4.0 https://creativecommons.org/licenses/by-

DocID: 1tSu9 - View Document

Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1  TU Eindhoven, Faculty of Mathematics and Computer Science

Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

DocID: 1tJ4h - View Document

X.509 in Practice (It’s worse than you think)* *	
  	
  Unless	
  you	
  are	
  immensely	
  suspicious	
  and	
  possibly	
  paranoid	
    Outline

X.509 in Practice (It’s worse than you think)* *    Unless  you  are  immensely  suspicious  and  possibly  paranoid   Outline

DocID: 1txAW - View Document

SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations Sze Yiu Chau∗ Omar Chowdhury† Endadul Hoque∗ Huangyi Ge∗ Aniket Kate∗ Cristina Nita-Rotaru‡ Ni

SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations Sze Yiu Chau∗ Omar Chowdhury† Endadul Hoque∗ Huangyi Ge∗ Aniket Kate∗ Cristina Nita-Rotaru‡ Ni

DocID: 1tufT - View Document