Results 221 to 230 of about 160,083 (235)
Some of the next articles are maybe not open access.
MD5 Secured Cryptographic Hash Value
Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, 2018Over the past two decades, significant researches have been done in analyzing the MD5 algorithm to address its collision problem. This paper enhanced the original MD5 by adding four logical operations to increase the security of the message to become free from collision attack.
Larry B. de Guzman+2 more
openaire +2 more sources
2020
If X is sender of a message and Y is the receiver of the same, then X encrypts the same with Y’s public key and then sends the encrypted data to Y. It confirms about authenticity and authorization of receiver. If X sends message and Y receives, X encrypts the message with X’s private key and sends the encrypted data to Y.
Surojit Roy+3 more
openaire +2 more sources
If X is sender of a message and Y is the receiver of the same, then X encrypts the same with Y’s public key and then sends the encrypted data to Y. It confirms about authenticity and authorization of receiver. If X sends message and Y receives, X encrypts the message with X’s private key and sends the encrypted data to Y.
Surojit Roy+3 more
openaire +2 more sources
Studies of Quadratic Watermark Based on MD5
2013In the area of digital watermark’s copyright protection, it is difficult to identify the rightful ownership in multiple marks, namely the interpretation attack. In this paper, we propound the quadratic watermark based on the message-digest algorithm 5 (MD5). By embedding a watermark and the MD5 into the products in proper order, the products can resist
Shibo Qiu, Lei Liu, Taolin Ma
openaire +2 more sources
Construction of the Initial Structure for Preimage Attack of MD5
2009 International Conference on Computational Intelligence and Security, 2009The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule” technique, the successful possibility of the construction is higher than 2-32 . Our construction is based on the MD5 structure, the message modification technique which is improved from Wang’ s. Some related techniques such
Jin Xu, Ming Mao, Shaohui Chen
openaire +2 more sources
DeyPos: For multi-users environments using MD5
2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), 2017Dynamic Proof of Storage (PoS) is a conducive cryptographic rudimentary technology that empowers a client to cohere the respectability of outsourced and in addition insourced records and to proficiently refresh the documents in a server. A multi-client needs the protected customer side cross-client replica method, enabling a client to avoid the ...
Manisha Bharati+2 more
openaire +2 more sources
TG43 - The MD5 Checksum for an MSL Report
2023MSL can provide electronic calibration, test, and measurement reports in Portable Document Format (PDF) as an alternative to paper documents. When a report is emailed to a customer, MSL also provides an MD5 checksum for the file. A new checksum should be calculated on arrival and compared to the one provided by MSL.
openaire +1 more source
Implementation of MD5 Collision Attack in Program
2019Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Le Wang+4 more
openaire +2 more sources
A New Type of 2-Block Collisions in MD5
2008We present a new type of 2-block collisions for MD5. The colliding messages differ in words m 2 , m 9 , m 12 in both blocks. The differential paths for the collisions were generated by our implementation of Stevens algorithm [11]. The actual colliding messages were found by a version of Klima’s algorithm involving tunnels [3].
Jiří Tůma+3 more
openaire +2 more sources
Improvement and security analysis on MD5
Journal of Computer Applications, 2009Yi-xian Yang+2 more
openaire +2 more sources
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Gaoli Wang, Yu Sasaki, Lei Wang
openaire +2 more sources
Gaoli Wang, Yu Sasaki, Lei Wang
openaire +2 more sources