Results 221 to 230 of about 12,847 (250)
Some of the next articles are maybe not open access.
Network Security, 2009
MD5 has been used widely so far. It is still heavily used in areas such as banking and even computer forensics. However, a recent security research paper seems to have reaffirmed fears that this algorithm is no longer suitable.
openaire +2 more sources
MD5 has been used widely so far. It is still heavily used in areas such as banking and even computer forensics. However, a recent security research paper seems to have reaffirmed fears that this algorithm is no longer suitable.
openaire +2 more sources
3D-Playfair Encrypted Message Verification Technology based on MD5
Asia Joint Conference on Information Security, 2020In the world of information development, the transmission of information is much more convenient. However, the transmission process always faces the risk of being attacked, stolen and tampered, which leads to the doubt that the data source is incorrect ...
W. Kuo+3 more
semanticscholar +1 more source
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
He Debiao, Chen Jianhua, Wang Yu
openaire +2 more sources
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
He Debiao, Chen Jianhua, Wang Yu
openaire +2 more sources
Enhancing MD5 Collision Susceptibility
Proceedings of the 4th International Conference on Industrial and Business Engineering, 2018Collision vulnerability of MD5 cryptographic hash function greatly affects the data integrity and authenticity of the hash value. In this study, the researchers introduced a new method for the padding process of the original message and implemented additional operations in the cryptographic hash function of MD5.
Rujie P. Medina+2 more
openaire +2 more sources
2019 International Conference on Information and Communications Technology (ICOIACT), 2019
Mobile-based applications that use the Client-Server system certainly require an Application Programming Interface (API) as an intermediary to communicate with each other.
De Rosal Ignatius Moses Setiadi+5 more
semanticscholar +1 more source
Mobile-based applications that use the Client-Server system certainly require an Application Programming Interface (API) as an intermediary to communicate with each other.
De Rosal Ignatius Moses Setiadi+5 more
semanticscholar +1 more source
Annual International Computer Software and Applications Conference, 2019
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme.
Zeyad A. Al-Odat, S. Khan
semanticscholar +1 more source
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme.
Zeyad A. Al-Odat, S. Khan
semanticscholar +1 more source
Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA
International Conference on VLSI Design, 2019FPGA implementation of MD5 hash algorithm is faster than its software counterpart, but a pre-image brute-force attack on MD5 hash still needs 2^(128) iterations theoretically.
Maruthi Gillela+2 more
semanticscholar +1 more source
Improved Collision Attacks on MD4 and MD5
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps.
Noboru Kunihiro+3 more
openaire +2 more sources
Debugging using MD5 process firewall
2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction.
C. U. Om Kumar+2 more
openaire +2 more sources
Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity
International Conference on Machine Learning and Soft Computing, 2019Data integrity is the main concern of this paper. An application was developed to implement the Enhanced MD5 Algorithm in Secured Socket Layer (SSL). Furthermore, this application secures the integrity of data sent and received via communication link ...
Larry B. de Guzman+2 more
semanticscholar +1 more source