I have seen MD5 hash collisions and I already created 2 exe files with same MD5, that's all I know.
I want to learn it in deep, for startup, I want to start with COMP128 v1 which is 10 years old and seems to have really easy collision. I see/read papers about it, but I can't really understand so I can't launch attack.
I'm writing my own code for this attack, but as I don't understand paper, I can't do it properly. I have everything needed, actual SIM cards, known KIs, COMP128 algorithm everything.
For example see this paper:
The attack exploits a lack of diffusion: there's a narrow ``pipe'' inside COMP128. In particular, bytes i,i+8,i+16,i+24 at the output of the second round depend only on bytes i,i+8,i+16,i+24 of the input to COMP128. (By ``round'', I refer to one layer of ``butterflies'' and S-boxes; there are a total of 5*8 rounds in COMP128.) Bytes i,i+8 of the COMP128 input are bytes i,i+8 of the key, and bytes i+16,i+24 of the COMP128 input are bytes i,i+8 of the challenge input.
I can't understand:
Could someone give me some easy documents/references for learning this type of knowledge?
Thanks from now