Results 11 to 20 of about 160,083 (235)
The Topology of Foliations Formed by the Generic K-Orbits of a Subclass of the Indecomposable MD5-Groups [PDF]
The present paper is a continuation of [13], [14] of the authors. Specifically, the paper considers the MD5-foliations associated to connected and simply connected MD5-groups such that their Lie algebras have 4-dimensional commutative derived ideal.
A. A. Kirillov+16 more
core +3 more sources
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +2 more sources
A Contribution To Secure The Routing Protocol "Greedy Perimeter Stateless Routing'' Using A Symmetric Signature-Based Aes And Md5 Hash [PDF]
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security.
Mohammed Erritali+2 more
openalex +2 more sources
There are various types of encryption that can be used, for example MD5 and SHA-256. However, using MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack.
Santi Sulastri, Riana Defi Mahadji Putri
doaj +3 more sources
Key Change Strategies for TCP-MD5
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openaire +5 more sources
Abstract The MD5 algorithm has been specified as part of the IPv6 protocol. However, some questions have been raised as to the ability of MD5 to provide the throughput needed for high-speed networks. This paper examines the performance of MD5 on the POWER2 architecture. The cause of poor performance for MD5 is identified, and three areas are examined
Arindam Banerji+3 more
openaire +3 more sources
Security Analysis of MD5 Algorithm in Password Storage [PDF]
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing.
Mary Cindy Ah Kioon+2 more
openaire +2 more sources
DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko+3 more
doaj +3 more sources
FPGA implementation of MD5 hash algorithm [PDF]
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC.
J. Deepakumara+2 more
openaire +3 more sources
A Study of the MD5 Attacks: Insights and Improvements [PDF]
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp.
John Black+2 more
openaire +3 more sources