Results 211 to 220 of about 169,700 (231)
Some of the next articles are maybe not open access.
Enhancing MD5 Collision Susceptibility
Proceedings of the 4th International Conference on Industrial and Business Engineering, 2018Collision vulnerability of MD5 cryptographic hash function greatly affects the data integrity and authenticity of the hash value. In this study, the researchers introduced a new method for the padding process of the original message and implemented additional operations in the cryptographic hash function of MD5.
Jake M. Libed +2 more
openaire +1 more source
Debugging using MD5 process firewall
2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction.
C.U. Om Kumar, S. Kishore, A. Geetha
openaire +1 more source
MD5 Secured Cryptographic Hash Value
Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, 2018Over the past two decades, significant researches have been done in analyzing the MD5 algorithm to address its collision problem. This paper enhanced the original MD5 by adding four logical operations to increase the security of the message to become free from collision attack.
Larry B. de Guzman +2 more
openaire +1 more source
Collisions of MMO-MD5 and Their Impact on Original MD5
2011In this paper, we find collisions of MD5 in the Matyas-Meyer-Oseas mode and Miyaguchi-Preneel mode with a complexity of 239 operations, which runs contrary to the cryptographer's belief that these modes are stronger against collision attacks than the Davies-Meyer mode due to the impossibility of the message modification.
openaire +1 more source
Hardware implementation of the MD5 algorithm.
IFAC Proceedings Volumes, 2009Abstract The paper presents a hardware implementation of the MD5 hash generator. The generator comprises MD5 processing unit, data exchange interface and memory block for storing input messages. A general concept and implementation of the MD5 generator modules is described.
D. Pamula, A. Ziebinski
openaire +1 more source
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
Wang Yu, Chen Jianhua, He Debiao
openaire +1 more source
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
Wang Yu, Chen Jianhua, He Debiao
openaire +1 more source
2008 International Conference on Advanced Computer Theory and Engineering, 2008
A new image retrieval method was introduced based on the combination of CBIR (content-based image retrieval) and MD5, after a brief introduction to current status of image retrieval technology. Kernel thought was that MD5 value was extracted from an image file and then indexed. These indexed MD5 values were used for image retrieval.
openaire +1 more source
A new image retrieval method was introduced based on the combination of CBIR (content-based image retrieval) and MD5, after a brief introduction to current status of image retrieval technology. Kernel thought was that MD5 value was extracted from an image file and then indexed. These indexed MD5 values were used for image retrieval.
openaire +1 more source
Preimage Attacks on Step-Reduced MD5
2008In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a complexity of 296. We also consider a preimage attack against variants of MD5 where the round order is modified from the real MD5.
Yu Sasaki, Kazumaro Aoki
openaire +1 more source
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Yu SASAKI, Gaoli WANG, Lei WANG
openaire +1 more source
Yu SASAKI, Gaoli WANG, Lei WANG
openaire +1 more source
MD5/MD6 HASH ALGORITMI U KRIPTOGRAFIJI
2021U ovom radu napravljena je analiza MD5 i MD6 algoritama te njihova usporedba s drugim poznatim hash algoritmima. Kriptografska hash funkcija je funkcija koja ulaznu poruku promjenjive duljine pretvara u niz fiksne duljine. Rezultat takve funkcije se naziva hash ili sažetak poruke.
openaire +1 more source

