Results 121 to 130 of about 160,083 (235)
ANALYSIS OF CRYPTOGRAPHIC STRENGTH OF THE MODIFIED MD5 ALGORITHM [PDF]
Valentin Telegin
openalex +1 more source
Encoding Cryptographic Functions to SAT Using Transalg System [PDF]
In this paper we propose the technology for constructing propositional encodings of discrete functions. It is aimed at solving inversion problems of considered functions using state-of-the-art SAT solvers. We implemented this technology in the form of the software system called Transalg, and used it to construct SAT encodings for a number of ...
arxiv
Design and evaluation of chaotic iterations based keyed hash function [PDF]
Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security.
arxiv
Deep Learning Based Cryptographic Primitive Classification [PDF]
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased.
arxiv
Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez+2 more
doaj
Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]
We consider fuzzy, or continuous, bits, which take values in [0;1] and (-1;1] instead of {0;1}, and operations on them (NOT, XOR etc.) and on their sequences (ADD), to obtain the generalization of cryptographic hash functions, CHFs, for the messages consisting of fuzzy bits, so that CHFs become smooth and non-constant functions of each bit of the ...
arxiv
Extracting a Salt from an MD5 Hash
This document shows how a salt was extracted from MD5-hashed paswords, based off the Anonymous leak of 800+K records from think-tank Stratfor.
openaire +2 more sources
Automated family-based naming of small RNAs for next generation sequencing data using a modified MD5-digest algorithm [PDF]
We developed NameMyGene, a web tool and a stand alone program to easily generate putative family-based names for small RNA sequences so that laboratories can easily organize, analyze, and observe patterns from, the massive amount of data generated by next-generation sequencers.
arxiv
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj +2 more sources