1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557
|
<pre>Internet Engineering Task Force (IETF) S. Turner
Request for Comments: 6150 IECA
Obsoletes: <a href="./rfc1320">1320</a> L. Chen
Category: Informational NIST
ISSN: 2070-1721 March 2011
<span class="h1">MD4 to Historic Status</span>
Abstract
This document retires <a href="./rfc1320">RFC 1320</a>, which documents the MD4 algorithm,
and discusses the reasons for doing so. This document moves <a href="./rfc1320">RFC 1320</a>
to Historic status.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see <a href="./rfc5741#section-2">Section 2 of RFC 5741</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc6150">http://www.rfc-editor.org/info/rfc6150</a>.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
<span class="grey">Turner & Chen Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
MD4 [<a href="#ref-MD4" title=""The MD4 Message-Digest Algorithm"">MD4</a>] is a message digest algorithm that takes as input a message
of arbitrary length and produces as output a 128-bit "fingerprint" or
"message digest" of the input. This document retires [<a href="#ref-MD4" title=""The MD4 Message-Digest Algorithm"">MD4</a>].
Specifically, this document moves <a href="./rfc1320">RFC 1320</a> [<a href="#ref-MD4" title=""The MD4 Message-Digest Algorithm"">MD4</a>] to Historic status.
The reasons for taking this action are discussed.
[<a id="ref-HASH-Attack">HASH-Attack</a>] summarizes the use of hashes in many protocols and
discusses how attacks against a message digest algorithm's one-way
and collision-free properties affect and do not affect Internet
protocols. Familiarity with [<a href="#ref-HASH-Attack">HASH-Attack</a>] is assumed.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Rationale</span>
MD4 was published in 1992 as an Informational RFC. Since its
publication, MD4 has been under attack [<a href="#ref-denBORBOS1992">denBORBOS1992</a>] [<a href="#ref-DOBB1995" title="1(3): 5">DOBB1995</a>]
[<a href="#ref-DOBB1996" title="pages 53-70">DOBB1996</a>] [<a href="#ref-GLRW2010" title=""Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2"">GLRW2010</a>] [<a href="#ref-WLDCY2005" title=" Cryptanalysis of Hash Functions MD4 and RIPEMD">WLDCY2005</a>] [<a href="#ref-LUER2008" title="LNCS 5086. Springer">LUER2008</a>]. In fact, RSA, in 1996,
suggested that MD4 should not be used [<a href="#ref-RSA-AdviceOnMD4">RSA-AdviceOnMD4</a>]. Microsoft
also made similar statements [<a href="#ref-MS-AdviceOnMD4">MS-AdviceOnMD4</a>].
In <a href="#section-6">Section 6</a>, this document discusses attacks against MD4 that
indicate use of MD4 is no longer appropriate when collision
resistance is required. <a href="#section-6">Section 6</a> also discusses attacks against
MD4's pre-image and second pre-image resistance. Additionally,
attacks against MD4 used in message authentication with a shared
secret (i.e., HMAC-MD4) are discussed.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Documents that Reference <a href="./rfc1320">RFC 1320</a></span>
Use of MD4 has been specified in the following RFCs:
Internet Standard (IS):
o [<a href="./rfc2289" title=""A One- Time Password System"">RFC2289</a>] A One-Time Password System.
Draft Standard (DS):
o [<a href="./rfc1629" title=""Guidelines for OSI NSAP Allocation in the Internet"">RFC1629</a>] Guidelines for OSI NSAP Allocation in the Internet.
Proposed Standard (PS):
o [<a href="./rfc3961" title=""Encryption and Checksum Specifications for Kerberos 5"">RFC3961</a>] Encryption and Checksum Specifications for Kerberos 5.
Best Current Practice (BCP):
o [<a href="./rfc4086" title=""Randomness Requirements for Security"">RFC4086</a>] Randomness Requirements for Security.
<span class="grey">Turner & Chen Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
Informational:
o [<a href="./rfc1760" title=""The S/KEY One-Time Password System"">RFC1760</a>] The S/KEY One-Time Password System.
o [<a href="./rfc1983" title=""Internet Users' Glossary"">RFC1983</a>] Internet Users' Glossary.
o [<a href="./rfc2433" title=""Microsoft PPP CHAP Extensions"">RFC2433</a>] Microsoft PPP CHAP Extensions.
o [<a href="./rfc2759" title=""Microsoft PPP CHAP Extensions, Version 2"">RFC2759</a>] Microsoft PPP CHAP Extensions, Version 2.
o [<a href="./rfc3174" title=""US Secure Hash Algorithm 1 (SHA1)"">RFC3174</a>] US Secure Hash Algorithm 1 (SHA1).
o [<a href="./rfc4757" title=""The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows"">RFC4757</a>] The RC4-HMAC Kerberos Encryption Types Used by
Microsoft Windows.
o [<a href="./rfc5126" title=""CMS Advanced Electronic Signatures (CAdES)"">RFC5126</a>] CMS Advanced Electronic Signatures (CAdES).
There are other RFCs that refer to MD2, but they have been either
moved to Historic status or obsoleted by a later RFC. References and
discussions about these RFCs are omitted. The notable exceptions
are:
o [<a href="./rfc2313" title=""PKCS #1: RSA Encryption Version 1.5"">RFC2313</a>] PKCS #1: RSA Encryption Version 1.5.
o [<a href="./rfc2437" title=""PKCS #1: RSA Cryptography Specifications Version 2.0"">RFC2437</a>] PKCS #1: RSA Cryptography Specifications Version 2.0.
o [<a href="./rfc3447" title=""Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1"">RFC3447</a>] Public-Key Cryptography Standards (PKCS) #1: RSA
Cryptography Specifications Version 2.1.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Impact of Moving MD4 to Historic</span>
The impact of moving MD4 to Historic is minimal with the one
exception of Microsoft's use of MD4 as part of RC4-HMAC in Windows,
as described below.
Regarding DS, PS, and BCP RFCs:
o The initial One-Time Password systems, based on [<a href="./rfc2289" title=""A One- Time Password System"">RFC2289</a>], have
ostensibly been replaced by HMAC-based mechanism, as specified in
"HOTP: An HMAC-Based One-Time Password Algorithm" [<a href="./rfc4226" title=""HOTP: An HMAC-Based One-Time Password Algorithm"">RFC4226</a>].
[<a href="./rfc4226" title=""HOTP: An HMAC-Based One-Time Password Algorithm"">RFC4226</a>] suggests following recommendations in [<a href="./rfc4086" title=""Randomness Requirements for Security"">RFC4086</a>] for
random input, and in [<a href="./rfc4086" title=""Randomness Requirements for Security"">RFC4086</a>] weaknesses of MD4 are discussed.
o MD4 was used in the Inter-Domain Routing Protocol (IDRP); each IDRP
message carries a 16-octet hash that is computed by applying the
MD-4 algorithm (<a href="./rfc1320">RFC 1320</a>) to the context of the message itself.
Over time, IDRP was replaced by BGP-4 [<a href="./rfc4271" title=""A Border Gateway Protocol 4 (BGP-4)"">RFC4271</a>], which required at
least [<a href="#ref-MD5" title=""The MD5 Message-Digest Algorithm"">MD5</a>].
<span class="grey">Turner & Chen Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
o Kerberos Version 5 [<a href="./rfc3961" title=""Encryption and Checksum Specifications for Kerberos 5"">RFC3961</a>] specifies the use of MD4 for DES
encryption types and checksum types. They were specified, never
really used, and are in the process of being deprecated by
[<a href="#ref-DES-DIE" title=""Deprecate DES support for Kerberos"">DES-DIE</a>]. Further, the mandatory-to-implement encrypted types and
checksum types specified by Kerberos are based on AES-256 and HMAC-
SHA1 [<a href="./rfc3962" title=""Advanced Encryption Standard (AES) Encryption for Kerberos 5"">RFC3962</a>].
Regarding Informational RFCs:
o PKCS#1 v1.5 [<a href="./rfc2313" title=""PKCS #1: RSA Encryption Version 1.5"">RFC2313</a>] indicated that there was no reason to not use
MD4. PKCS#1 v2.0 [<a href="./rfc2437" title=""PKCS #1: RSA Cryptography Specifications Version 2.0"">RFC2437</a>] and v2.1 [<a href="./rfc3447" title=""Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1"">RFC3447</a>] recommend against
MD4 due to cryptoanalytic progress having uncovered weaknesses in
the collision resistance of MD4.
o Randomness Requirements [<a href="./rfc4086" title=""Randomness Requirements for Security"">RFC4086</a>] does mention MD4, but not in a
good way; it explains how the algorithm works and that there have
been a number of attacks found against it.
o The "Internet Users' Glossary" [<a href="./rfc1983" title=""Internet Users' Glossary"">RFC1983</a>] provided a definition for
Message Digest and listed MD4 as one example.
o The IETF OTP specification [<a href="./rfc2289" title=""A One- Time Password System"">RFC2289</a>] was based on S/KEY technology.
So S/KEY was replaced by OTP, at least in theory. Additionally,
the S/KEY implementations in the wild have started to use MD5 in
lieu of MD4.
o The CAdES document [<a href="./rfc5126" title=""CMS Advanced Electronic Signatures (CAdES)"">RFC5126</a>] lists MD4 as a hash algorithm,
disparages it, and then does not mention it again.
o The SHA-1 document [<a href="./rfc3174" title=""US Secure Hash Algorithm 1 (SHA1)"">RFC3174</a>] mentions MD4 in the acknowledgements
section.
o The three RFCs describing Microsoft protocols, [<a href="./rfc2433" title=""Microsoft PPP CHAP Extensions"">RFC2433</a>],
[<a href="./rfc2759" title=""Microsoft PPP CHAP Extensions, Version 2"">RFC2759</a>], and [<a href="./rfc4757" title=""The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows"">RFC4757</a>], are very widely deployed as MS-CHAP v1,
MS-CHAP v2, and RC4-HMAC, respectively.
o MS-CHAP Version 1 is supported in Microsoft's Windows XP, 2000,
98, 95, NT 4.0, NT 3.51, and NT 3.5, but support has been
dropped in Vista. MS-CHAP Version 2 is supported in Microsoft's
Windows 7, Vista, XP, 2000, 98, 95, and NT 4.0. Both versions
of MS-CHAP are also supported by RADIUS [<a href="./rfc2548" title=""Microsoft Vendor-specific RADIUS Attributes"">RFC2548</a>] and the
Extensible Authentication Protocol (EAP) [<a href="./rfc5281" title=""Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)"">RFC5281</a>]. In 2007,
[<a href="./rfc4962" title=""Guidance for Authentication, Authorization, and Accounting (AAA) Key Management"">RFC4962</a>] listed MS-CHAP v1 and v2 as flawed and recommended
against their use; these incidents were presented as a strong
indication for the necessity of built-in crypto-algorithm
agility in Authentication, Authorization, and Accounting (AAA)
protocols.
<span class="grey">Turner & Chen Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
o The RC4-HMAC is supported in Microsoft's Windows 2000 and later
versions of Windows for backwards compatibility with Windows
2000. As [<a href="./rfc4757" title=""The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows"">RFC4757</a>] stated, RC4-HMAC doesn't rely on the
collision resistance property of MD4, but uses it to generate a
key from a password, which is then used as input to HMAC-MD5.
For an attacker to recover the password from RC4-HMAC, the
attacker first needs to recover the key that is used with HMAC-
MD5. As noted in [<a href="./rfc6151" title=""Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms"">RFC6151</a>], key recovery attacks on HMAC-MD5
are not yet practical.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Other Considerations</span>
rsync [<a href="#ref-RSYNC">RSYNC</a>], a non-IETF protocol, once specified the use of MD4,
but as of version 3.0.0 published in 2008, it has adopted MD5 [<a href="#ref-MD5" title=""The MD5 Message-Digest Algorithm"">MD5</a>].
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Security Considerations</span>
This section addresses attacks against MD4's collisions, pre-image,
and second pre-image resistance. Additionally, attacks against HMAC-
MD4 are discussed.
Some may find the guidance for key lengths and algorithm strengths in
[<a href="#ref-SP800-57" title=" Special Publication 800-57: Recommendation for Key Management - Part 1 (Revised)">SP800-57</a>] and [<a href="#ref-SP800-131" title=" Special Publication 800-131: DRAFT Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes">SP800-131</a>] useful.
<span class="h3"><a class="selflink" id="section-6.1" href="#section-6.1">6.1</a>. Collision Resistance</span>
A practical attack on MD4 was shown by Dobbertin in 1996 with
complexity 2^20 of MD4 hash computations [<a href="#ref-DOBB1996" title="pages 53-70">DOBB1996</a>]. In 2004, a more
devastating result presented by Xiaoyun Wang showed that the
complexity can be reduced to 2^8 of MD4 hash operations. At the Rump
Session of Crypto 2004, Wang said that as a matter of fact, finding a
collision of MD4 can be accomplished with a pen on a piece of paper.
The formal result was presented at EUROCRYPT 2005 in [<a href="#ref-WLDCY2005" title=" Cryptanalysis of Hash Functions MD4 and RIPEMD">WLDCY2005</a>].
<span class="h3"><a class="selflink" id="section-6.2" href="#section-6.2">6.2</a>. Pre-Image and Second Pre-Image Resistance</span>
The first pre-image attack on full MD4 was accomplished in [<a href="#ref-LUER2008" title="LNCS 5086. Springer">LUER2008</a>]
with complexity 2^100. Some improvements are shown on pre-image
attacks and second pre-image attacks of MD4 with certain pre-
computations [<a href="#ref-GLRW2010" title=""Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2"">GLRW2010</a>], where complexity is reduced to 2^78.4 and
2^69.4 for pre-image and second pre-image, respectively. The pre-
image attacks on MD4 are practical. It cannot be used as a one-way
function. For example, it must not be used to hash a cryptographic
key of 80 bits or longer.
<span class="grey">Turner & Chen Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
<span class="h3"><a class="selflink" id="section-6.3" href="#section-6.3">6.3</a>. HMAC</span>
The attacks on Hash-based Message Authentication Code (HMAC)
algorithms [<a href="./rfc2104" title=""HMAC: Keyed- Hashing for Message Authentication"">RFC2104</a>] presented so far can be classified in three
types: distinguishing attacks, existential forgery attacks, and key
recovery attacks. Of course, among all these attacks, key recovery
attacks are the most severe attacks.
The best results on key recovery attacks on HMAC-MD4 were published
at EUROCRYPT 2008 with 2^72 queries and 2^77 MD4 computations
[<a href="#ref-WOK2008" title="and N. Kunihiro">WOK2008</a>].
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Recommendation</span>
Despite MD4 seeing some deployment on the Internet, this
specification obsoletes [<a href="#ref-MD4" title=""The MD4 Message-Digest Algorithm"">MD4</a>] because MD4 is not a reasonable
candidate for further standardization and should be deprecated in
favor of one or more existing hash algorithms (e.g., SHA-256 [<a href="#ref-SHS" title=" FIPS Publication 180-3: Secure Hash Standard">SHS</a>]).
RSA Security considers it appropriate to move the MD4 algorithm to
Historic status.
It takes a number of years to deploy crypto and it also takes a
number of years to withdraw it. Algorithms need to be withdrawn
before a catastrophic break is discovered. MD4 is clearly showing
signs of weakness, and implementations should strongly consider
removing support and migrating to another hash algorithm.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Acknowledgements</span>
We'd like to thank RSA for publishing MD4. Obviously, we have to
thank all the cryptographers who produced the results we refer to in
this document. We'd also like to thank Ran Atkinson, Sue Hares, Sam
Hartman, Alfred Hoenes, John Linn, Catherine Meadows, Magnus Nystrom,
and Martin Rex for their input.
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. Informative References</span>
[<a id="ref-denBORBOS1992">denBORBOS1992</a>]
B. den Boer and A. Bosselaers. An attack on the last two
rounds of MD4. In Advances in Cryptology - Crypto '91,
pages 194-203, Springer-Verlag, 1992.
[<a id="ref-DES-DIE">DES-DIE</a>] Astrand, L., <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22Deprecate+DES+support+for+Kerberos%22'>"Deprecate DES support for Kerberos"</a>, Work
in Progress, July 2010.
[<a id="ref-DOBB1995">DOBB1995</a>] H. Dobbertin. Alf swindles Ann. CryptoBytes, 1(3): 5,
1995.
<span class="grey">Turner & Chen Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
[<a id="ref-DOBB1996">DOBB1996</a>] H. Dobbertin. Cryptanalysis of MD4. In Proceedings of
the 3rd Workshop on Fast Software Encryption, Cambridge,
U.K., pages 53-70, Lecture Notes in Computer Science
1039, Springer-Verlag, 1996.
[<a id="ref-GLRW2010">GLRW2010</a>] Guo, J., Ling, S., Rechberger, C., and H. Wang, "Advanced
Meet-in-the-Middle Preimage Attacks: First Results on
Full Tiger, and Improved Results on MD4 and SHA-2",
<a href="http://eprint.iacr.org/2010/016.pdf">http://eprint.iacr.org/2010/016.pdf</a>.
[<a id="ref-HASH-Attack">HASH-Attack</a>]
Hoffman, P. and B. Schneier, "Attacks on Cryptographic
Hashes in Internet Protocols", <a href="./rfc4270">RFC 4270</a>, November 2005.
[<a id="ref-LUER2008">LUER2008</a>] G. Leurent. MD4 is Not One-Way. Fast Software
Encryption 2008, Lausanne, Switzerland, February 10-13,
2008, LNCS 5086. Springer, 2008.
[<a id="ref-MD4">MD4</a>] Rivest, R., "The MD4 Message-Digest Algorithm", <a href="./rfc1320">RFC 1320</a>,
April 1992.
[<a id="ref-MD5">MD5</a>] Rivest, R., "The MD5 Message-Digest Algorithm", <a href="./rfc1321">RFC 1321</a>,
April 1992.
[<a id="ref-MS-AdviceOnMD4">MS-AdviceOnMD4</a>]
Howard, M., "Secure Habits: 8 Simple Rules For Developing
More Secure Code", <a href="http://msdn.microsoft.com/en-us/magazine/cc163518.aspx#S6">http://msdn.microsoft.com/</a>
<a href="http://msdn.microsoft.com/en-us/magazine/cc163518.aspx#S6">en-us/magazine/cc163518.aspx#S6</a>.
[<a id="ref-RFC1629">RFC1629</a>] Colella, R., Callon, R., Gardner, E., and Y. Rekhter,
"Guidelines for OSI NSAP Allocation in the Internet", <a href="./rfc1629">RFC</a>
<a href="./rfc1629">1629</a>, May 1994.
[<a id="ref-RFC1760">RFC1760</a>] Haller, N., "The S/KEY One-Time Password System", <a href="./rfc1760">RFC</a>
<a href="./rfc1760">1760</a>, February 1995.
[<a id="ref-RFC1983">RFC1983</a>] Malkin, G., Ed., "Internet Users' Glossary", FYI 18, <a href="./rfc1983">RFC</a>
<a href="./rfc1983">1983</a>, August 1996.
[<a id="ref-RFC2104">RFC2104</a>] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
Hashing for Message Authentication", <a href="./rfc2104">RFC 2104</a>, February
1997.
[<a id="ref-RFC2289">RFC2289</a>] Haller, N., Metz, C., Nesser, P., and M. Straw, "A One-
Time Password System", STD 61, <a href="./rfc2289">RFC 2289</a>, February 1998.
[<a id="ref-RFC2313">RFC2313</a>] Kaliski, B., "PKCS #1: RSA Encryption Version 1.5", <a href="./rfc2313">RFC</a>
<a href="./rfc2313">2313</a>, March 1998.
<span class="grey">Turner & Chen Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
[<a id="ref-RFC2433">RFC2433</a>] Zorn, G. and S. Cobb, "Microsoft PPP CHAP Extensions",
<a href="./rfc2433">RFC 2433</a>, October 1998.
[<a id="ref-RFC2437">RFC2437</a>] Kaliski, B., and J. Staddon, "PKCS #1: RSA Cryptography
Specifications Version 2.0", <a href="./rfc2437">RFC 2437</a>, October 1998.
[<a id="ref-RFC2548">RFC2548</a>] Zorn, G., "Microsoft Vendor-specific RADIUS Attributes",
<a href="./rfc2548">RFC 2548</a>, March 1999.
[<a id="ref-RFC2759">RFC2759</a>] Zorn, G., "Microsoft PPP CHAP Extensions, Version 2", <a href="./rfc2759">RFC</a>
<a href="./rfc2759">2759</a>, January 2000.
[<a id="ref-RFC3174">RFC3174</a>] Eastlake 3rd, D. and P. Jones, "US Secure Hash Algorithm
1 (SHA1)", <a href="./rfc3174">RFC 3174</a>, September 2001.
[<a id="ref-RFC3447">RFC3447</a>] Jonsson, J. and B. Kaliski, "Public-Key Cryptography
Standards (PKCS) #1: RSA Cryptography Specifications
Version 2.1", <a href="./rfc3447">RFC 3447</a>, February 2003.
[<a id="ref-RFC3961">RFC3961</a>] Raeburn, K., "Encryption and Checksum Specifications for
Kerberos 5", <a href="./rfc3961">RFC 3961</a>, February 2005.
[<a id="ref-RFC3962">RFC3962</a>] Raeburn, K., "Advanced Encryption Standard (AES)
Encryption for Kerberos 5", <a href="./rfc3962">RFC 3962</a>, February 2005.
[<a id="ref-RFC4086">RFC4086</a>] Eastlake 3rd, D., Schiller, J., and S. Crocker,
"Randomness Requirements for Security", <a href="https://www.rfc-editor.org/bcp/bcp106">BCP 106</a>, <a href="./rfc4086">RFC</a>
<a href="./rfc4086">4086</a>, June 2005.
[<a id="ref-RFC4226">RFC4226</a>] M'Raihi, D., Bellare, M., Hoornaert, F., Naccache, D.,
and O. Ranen, "HOTP: An HMAC-Based One-Time Password
Algorithm", <a href="./rfc4226">RFC 4226</a>, December 2005.
[<a id="ref-RFC4271">RFC4271</a>] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
Border Gateway Protocol 4 (BGP-4)", <a href="./rfc4271">RFC 4271</a>, January
2006.
[<a id="ref-RFC4757">RFC4757</a>] Jaganathan, K., Zhu, L., and J. Brezak, "The RC4-HMAC
Kerberos Encryption Types Used by Microsoft Windows", <a href="./rfc4757">RFC</a>
<a href="./rfc4757">4757</a>, December 2006.
[<a id="ref-RFC4962">RFC4962</a>] Housley, R. and B. Aboba, "Guidance for Authentication,
Authorization, and Accounting (AAA) Key Management", <a href="https://www.rfc-editor.org/bcp/bcp132">BCP</a>
<a href="https://www.rfc-editor.org/bcp/bcp132">132</a>, <a href="./rfc4962">RFC 4962</a>, July 2007.
[<a id="ref-RFC5126">RFC5126</a>] Pinkas, D., Pope, N., and J. Ross, "CMS Advanced
Electronic Signatures (CAdES)", <a href="./rfc5126">RFC 5126</a>, March 2008.
<span class="grey">Turner & Chen Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
[<a id="ref-RFC5281">RFC5281</a>] Funk, P. and S. Blake-Wilson, "Extensible Authentication
Protocol Tunneled Transport Layer Security Authenticated
Protocol Version 0 (EAP-TTLSv0)", <a href="./rfc5281">RFC 5281</a>, August 2008.
[<a id="ref-RFC6151">RFC6151</a>] Turner, S. and L. Chen, "Updated Security Considerations
for the MD5 Message-Digest and the HMAC-MD5 Algorithms",
<a href="./rfc6151">RFC 6151</a>, March 2011.
[<a id="ref-RSA-AdviceOnMD4">RSA-AdviceOnMD4</a>]
Robshaw, M.J.B., "On Recent Results for MD2, MD4 and
MD5", November 1996,
<a href="ftp://ftp.rsasecurity.com/pub/pdfs/bulletn4.pdf">ftp://ftp.rsasecurity.com/pub/pdfs/bulletn4.pdf</a>.
[<a id="ref-RSYNC">RSYNC</a>] rsync web pages, <a href="http://www.samba.org/rsync/">http://www.samba.org/rsync/</a>.
[<a id="ref-SHS">SHS</a>] National Institute of Standards and Technology (NIST),
FIPS Publication 180-3: Secure Hash Standard, October
2008.
[<a id="ref-SP800-57">SP800-57</a>] National Institute of Standards and Technology (NIST),
Special Publication 800-57: Recommendation for Key
Management - Part 1 (Revised), March 2007.
[<a id="ref-SP800-131">SP800-131</a>] National Institute of Standards and Technology (NIST),
Special Publication 800-131: DRAFT Recommendation for the
Transitioning of Cryptographic Algorithms and Key Sizes,
June 2010.
[<a id="ref-WLDCY2005">WLDCY2005</a>] X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu,
Cryptanalysis of Hash Functions MD4 and RIPEMD, LNCS
3944, Advances in Cryptology - EUROCRYPT2005, Springer,
2005.
[<a id="ref-WOK2008">WOK2008</a>] L. Wang, K. Ohta, and N. Kunihiro, New Key-recovery
Attacks on HMAC/NMAC-MD4 and NMAC-MD5, EUROCRYPT 2008,
LNCS 4965, Springer, 2008.
<span class="grey">Turner & Chen Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc6150">RFC 6150</a> MD2 to Historic Status March 2011</span>
Authors' Addresses
Sean Turner
IECA, Inc.
3057 Nutley Street, Suite 106
Fairfax, VA 22031
USA
EMail: turners@ieca.com
Lily Chen
National Institute of Standards and Technology
100 Bureau Drive, Mail Stop 8930
Gaithersburg, MD 20899-8930
USA
EMail: lily.chen@nist.gov
Turner & Chen Informational [Page 10]
</pre>
|