Results 201 to 210 of about 167,764 (227)
Some of the next articles are maybe not open access.
2010 Second International Conference on Multimedia and Information Technology, 2010
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its ...
Zhao Yong-Xia, Zhen Ge
openaire +1 more source
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its ...
Zhao Yong-Xia, Zhen Ge
openaire +1 more source
MD5( ) Bypassing Through SQL Injection
Kristu Jayanti Journal of Computational Sciences (KJCS), 2021Web-based application attacks are growing dramatically in number and severity. They found that web applications that are poorly validated and verified are susceptible to attacks by the attacker. network related SQL attacks. The MD5 (message digest algorithm) hashing method is a one-way cryptographic function that accepts any text field as input and ...
Rakesh P. V., Selwyn Paul J.
openaire +1 more source
2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks.
Hu Ming, Wang Yan
openaire +1 more source
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks.
Hu Ming, Wang Yan
openaire +1 more source
Enhancing MD5 Collision Susceptibility
Proceedings of the 4th International Conference on Industrial and Business Engineering, 2018Collision vulnerability of MD5 cryptographic hash function greatly affects the data integrity and authenticity of the hash value. In this study, the researchers introduced a new method for the padding process of the original message and implemented additional operations in the cryptographic hash function of MD5.
Jake M. Libed +2 more
openaire +1 more source
Debugging using MD5 process firewall
2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction.
C.U. Om Kumar, S. Kishore, A. Geetha
openaire +1 more source
MD5 Secured Cryptographic Hash Value
Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, 2018Over the past two decades, significant researches have been done in analyzing the MD5 algorithm to address its collision problem. This paper enhanced the original MD5 by adding four logical operations to increase the security of the message to become free from collision attack.
Larry B. de Guzman +2 more
openaire +1 more source
Collisions of MMO-MD5 and Their Impact on Original MD5
2011In this paper, we find collisions of MD5 in the Matyas-Meyer-Oseas mode and Miyaguchi-Preneel mode with a complexity of 239 operations, which runs contrary to the cryptographer's belief that these modes are stronger against collision attacks than the Davies-Meyer mode due to the impossibility of the message modification.
openaire +1 more source

