Results 11 to 20 of about 164,602 (198)

Problems using MD5 with IPv6

open access: hybridPerformance Evaluation, 1996
Summary: The MD5 algorithm has been specified as part of the IPv6 protocol. However, some questions have been raised as to the ability of MD5 to provide the throughput needed for high-speed networks. This paper examines the performance of MD5 on the POWER2 architecture.
Larry D. Barchett   +3 more
openalex   +4 more sources

Collisions for the compression function of MD5 [PDF]

open access: hybrid, 1994
At Crypto '91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as a strengthened version of MD4, differing from it on six points. Four changes are due to the two existing attacks on the two round versions of MD4. The other two changes should additionally strengthen MD5. However both these changes cannot be described as well-considered.
Bert den Boer, Antoon Bosselaers
openalex   +2 more sources

DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5

open access: diamondSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko   +3 more
doaj   +3 more sources

How to Break EAP-MD5 [PDF]

open access: bronze, 2012
We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which ...
Fanbao Liu, Tao Xie
openalex   +3 more sources

FPGA implementation of MD5 hash algorithm [PDF]

open access: greenCanadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555), 2002
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC.
Janaka Deepakumara   +2 more
openalex   +3 more sources

A Study of the MD5 Attacks: Insights and Improvements [PDF]

open access: bronze, 2006
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp.
John Black   +2 more
openalex   +3 more sources

Hardware implementation of the MD5 algorithm.

open access: bronzeIFAC Proceedings Volumes, 2009
Abstract The paper presents a hardware implementation of the MD5 hash generator. The generator comprises MD5 processing unit, data exchange interface and memory block for storing input messages. A general concept and implementation of the MD5 generator modules is described.
Danuta Pamuła, Adam Ziębiński
openalex   +3 more sources

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: diamondEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +2 more sources

Sodium butyrate impedes the lymphoma caused by Marek’s disease virus via regulating the mitochondrial apoptosis pathway [PDF]

open access: yesFrontiers in Veterinary Science
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Qiaoer Lin   +14 more
doaj   +2 more sources

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: bronze, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy