Results 11 to 20 of about 160,083 (235)

The Topology of Foliations Formed by the Generic K-Orbits of a Subclass of the Indecomposable MD5-Groups [PDF]

open access: green, 2008
The present paper is a continuation of [13], [14] of the authors. Specifically, the paper considers the MD5-foliations associated to connected and simply connected MD5-groups such that their Lie algebras have 4-dimensional commutative derived ideal.
A. A. Kirillov   +16 more
core   +3 more sources

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]

open access: hybridCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +2 more sources

A Contribution To Secure The Routing Protocol "Greedy Perimeter Stateless Routing'' Using A Symmetric Signature-Based Aes And Md5 Hash [PDF]

open access: bronzeInternational Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.5, September 2011 p95-103, ISSN: 0976 - 9757 [Online]; 2229 - 3957 [Print], 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security.
Mohammed Erritali   +2 more
openalex   +2 more sources

Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan

open access: diamondJurnal Teknik Elektro, 2018
There are various types of encryption that can be used, for example MD5 and SHA-256. However, using MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack.
Santi Sulastri, Riana Defi Mahadji Putri
doaj   +3 more sources

Key Change Strategies for TCP-MD5

open access: green, 2007
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openaire   +5 more sources

Problems using MD5 with IPv6

open access: hybridPerformance Evaluation, 1996
Abstract The MD5 algorithm has been specified as part of the IPv6 protocol. However, some questions have been raised as to the ability of MD5 to provide the throughput needed for high-speed networks. This paper examines the performance of MD5 on the POWER2 architecture. The cause of poor performance for MD5 is identified, and three areas are examined
Arindam Banerji   +3 more
openaire   +3 more sources

Security Analysis of MD5 Algorithm in Password Storage [PDF]

open access: goldApplied Mechanics and Materials, 2013
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing.
Mary Cindy Ah Kioon   +2 more
openaire   +2 more sources

DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5

open access: diamondSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko   +3 more
doaj   +3 more sources

FPGA implementation of MD5 hash algorithm [PDF]

open access: greenCanadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555), 2002
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC.
J. Deepakumara   +2 more
openaire   +3 more sources

A Study of the MD5 Attacks: Insights and Improvements [PDF]

open access: bronze, 2006
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp.
John Black   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy