Results 221 to 230 of about 12,847 (250)
Some of the next articles are maybe not open access.

The death of MD5

Network Security, 2009
MD5 has been used widely so far. It is still heavily used in areas such as banking and even computer forensics. However, a recent security research paper seems to have reaffirmed fears that this algorithm is no longer suitable.
openaire   +2 more sources

3D-Playfair Encrypted Message Verification Technology based on MD5

Asia Joint Conference on Information Security, 2020
In the world of information development, the transmission of information is much more convenient. However, the transmission process always faces the risk of being attacked, stolen and tampered, which leads to the doubt that the data source is incorrect ...
W. Kuo   +3 more
semanticscholar   +1 more source

A New Collision Attack on MD5

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
He Debiao, Chen Jianhua, Wang Yu
openaire   +2 more sources

Enhancing MD5 Collision Susceptibility

Proceedings of the 4th International Conference on Industrial and Business Engineering, 2018
Collision vulnerability of MD5 cryptographic hash function greatly affects the data integrity and authenticity of the hash value. In this study, the researchers introduced a new method for the padding process of the original message and implemented additional operations in the cryptographic hash function of MD5.
Rujie P. Medina   +2 more
openaire   +2 more sources

A Comparative Study MD5 and SHA1 Algorithms to Encrypt REST API Authentication on Mobile-based Application

2019 International Conference on Information and Communications Technology (ICOIACT), 2019
Mobile-based applications that use the Client-Server system certainly require an Application Programming Interface (API) as an intermediary to communicate with each other.
De Rosal Ignatius Moses Setiadi   +5 more
semanticscholar   +1 more source

The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions

Annual International Computer Software and Applications Conference, 2019
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme.
Zeyad A. Al-Odat, S. Khan
semanticscholar   +1 more source

Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA

International Conference on VLSI Design, 2019
FPGA implementation of MD5 hash algorithm is faster than its software counterpart, but a pre-image brute-force attack on MD5 hash still needs 2^(128) iterations theoretically.
Maruthi Gillela   +2 more
semanticscholar   +1 more source

Improved Collision Attacks on MD4 and MD5

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps.
Noboru Kunihiro   +3 more
openaire   +2 more sources

Debugging using MD5 process firewall

2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction.
C. U. Om Kumar   +2 more
openaire   +2 more sources

Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity

International Conference on Machine Learning and Soft Computing, 2019
Data integrity is the main concern of this paper. An application was developed to implement the Enhanced MD5 Algorithm in Secured Socket Layer (SSL). Furthermore, this application secures the integrity of data sent and received via communication link ...
Larry B. de Guzman   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy