Results 201 to 210 of about 166,374 (227)
Some of the next articles are maybe not open access.

MD5 Research

2010 Second International Conference on Multimedia and Information Technology, 2010
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its ...
Zhao Yong-Xia, Zhen Ge
openaire   +1 more source

MD5-Based Error Detection

2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks.
Hu Ming, Wang Yan
openaire   +1 more source

Hardware implementation of the MD5 algorithm.

IFAC Proceedings Volumes, 2009
Abstract The paper presents a hardware implementation of the MD5 hash generator. The generator comprises MD5 processing unit, data exchange interface and memory block for storing input messages. A general concept and implementation of the MD5 generator modules is described.
D. Pamula, A. Ziebinski
openaire   +1 more source

A New Collision Attack on MD5

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
Wang Yu, Chen Jianhua, He Debiao
openaire   +1 more source

Collisions of MMO-MD5 and Their Impact on Original MD5

2011
In this paper, we find collisions of MD5 in the Matyas-Meyer-Oseas mode and Miyaguchi-Preneel mode with a complexity of 239 operations, which runs contrary to the cryptographer's belief that these modes are stronger against collision attacks than the Davies-Meyer mode due to the impossibility of the message modification.
openaire   +1 more source

Enhancing MD5 Collision Susceptibility

Proceedings of the 4th International Conference on Industrial and Business Engineering, 2018
Collision vulnerability of MD5 cryptographic hash function greatly affects the data integrity and authenticity of the hash value. In this study, the researchers introduced a new method for the padding process of the original message and implemented additional operations in the cryptographic hash function of MD5.
Jake M. Libed   +2 more
openaire   +1 more source

Design and Implementation of OTP Base on MD5

Applied Mechanics and Materials, 2014
Encryption of information is getting increasingly large attention, due to the popularity of internet and the advance of technology. One of the encryption algorithms, MD5, is commonly used in data encryption nowadays. In this paper, MD5 algorithm was briefly described and used to construct a dynamic password encryption technique with time parameters ...
Zhi Chao Li   +4 more
openaire   +1 more source

Image Retrieval Based on MD5

2008 International Conference on Advanced Computer Theory and Engineering, 2008
A new image retrieval method was introduced based on the combination of CBIR (content-based image retrieval) and MD5, after a brief introduction to current status of image retrieval technology. Kernel thought was that MD5 value was extracted from an image file and then indexed. These indexed MD5 values were used for image retrieval.
openaire   +1 more source

Preimage Attacks on Step-Reduced MD5

2008
In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a complexity of 296. We also consider a preimage attack against variants of MD5 where the round order is modified from the real MD5.
Yu Sasaki, Kazumaro Aoki
openaire   +1 more source

Home - About - Disclaimer - Privacy