Results 221 to 230 of about 160,083 (235)
Some of the next articles are maybe not open access.

MD5 Secured Cryptographic Hash Value

Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, 2018
Over the past two decades, significant researches have been done in analyzing the MD5 algorithm to address its collision problem. This paper enhanced the original MD5 by adding four logical operations to increase the security of the message to become free from collision attack.
Larry B. de Guzman   +2 more
openaire   +2 more sources

A Journey from MD5 to SHA-3

2020
If X is sender of a message and Y is the receiver of the same, then X encrypts the same with Y’s public key and then sends the encrypted data to Y. It confirms about authenticity and authorization of receiver. If X sends message and Y receives, X encrypts the message with X’s private key and sends the encrypted data to Y.
Surojit Roy   +3 more
openaire   +2 more sources

Studies of Quadratic Watermark Based on MD5

2013
In the area of digital watermark’s copyright protection, it is difficult to identify the rightful ownership in multiple marks, namely the interpretation attack. In this paper, we propound the quadratic watermark based on the message-digest algorithm 5 (MD5). By embedding a watermark and the MD5 into the products in proper order, the products can resist
Shibo Qiu, Lei Liu, Taolin Ma
openaire   +2 more sources

Construction of the Initial Structure for Preimage Attack of MD5

2009 International Conference on Computational Intelligence and Security, 2009
The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule” technique, the successful possibility of the construction is higher than 2-32 . Our construction is based on the MD5 structure, the message modification technique which is improved from Wang’ s. Some related techniques such
Jin Xu, Ming Mao, Shaohui Chen
openaire   +2 more sources

DeyPos: For multi-users environments using MD5

2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), 2017
Dynamic Proof of Storage (PoS) is a conducive cryptographic rudimentary technology that empowers a client to cohere the respectability of outsourced and in addition insourced records and to proficiently refresh the documents in a server. A multi-client needs the protected customer side cross-client replica method, enabling a client to avoid the ...
Manisha Bharati   +2 more
openaire   +2 more sources

TG43 - The MD5 Checksum for an MSL Report

2023
MSL can provide electronic calibration, test, and measurement reports in Portable Document Format (PDF) as an alternative to paper documents. When a report is emailed to a customer, MSL also provides an MD5 checksum for the file. A new checksum should be calculated on arrival and compared to the one provided by MSL.
openaire   +1 more source

Implementation of MD5 Collision Attack in Program

2019
Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Le Wang   +4 more
openaire   +2 more sources

A New Type of 2-Block Collisions in MD5

2008
We present a new type of 2-block collisions for MD5. The colliding messages differ in words m 2 , m 9 , m 12 in both blocks. The differential paths for the collisions were generated by our implementation of Stevens algorithm [11]. The actual colliding messages were found by a version of Klima’s algorithm involving tunnels [3].
Jiří Tůma   +3 more
openaire   +2 more sources

Improvement and security analysis on MD5

Journal of Computer Applications, 2009
Yi-xian Yang   +2 more
openaire   +2 more sources

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Gaoli Wang, Yu Sasaki, Lei Wang
openaire   +2 more sources

Home - About - Disclaimer - Privacy