Results 31 to 40 of about 12,815 (252)

Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

open access: diamondEngineering Science and Technology, an International Journal, 2017
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi   +2 more
doaj   +2 more sources

Improved collision detection of MD5 with additional sufficient conditions

open access: yesElectronic Research Archive, 2022
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang   +6 more
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Implementasi Kombinasi Enkripsi Base64 Dengan Hashing Sha-1 Dan Md5 Pada Aplikasi Perpustakaan Universitas Muhammadiyah Bengkulu

open access: yesJurnal Teknologi Sistem Informasi dan Sistem Komputer TGD, 2023
One of the aspects of information security that can be done for a system is by adding security to a system, if using Base64 with static Sha-1 and Md5 hashing there is little possibility of data theft by hackers because they have been given layered ...
Implementasi Kombinasi   +9 more
semanticscholar   +1 more source

T‐depth reduction method for efficient SHA‐256 quantum circuit construction

open access: yesIET Information Security, Volume 17, Issue 1, Page 46-65, January 2023., 2023
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee   +3 more
wiley   +1 more source

Data Storage Security in Cloud Computing Using AES Algorithm and MD5 Algorithm

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
: The proposed method uses cryptographic techniques to maintain security as security is a critical issue for the cloud, and keeping secure data is a major concern today. Overload due to data duplication is a new challenge for clouds.
V. Varma   +4 more
semanticscholar   +1 more source

Komparasi Fungsi Hash Md5 Dan Sha256 Dalam Keamanan Gambar Dan Teks

open access: yesikraith-informatika, 2022
Implementasi ilmu kriptografi menjadi semakin sering digunakan seiring dengan daruratnya keamanan data. Ilmukriptografi yang di dalamnya terdapat fungsi hash mengubah data menjadi sebuah nilai representasi agar data yang dimaksudtidak dapat dengan mudah ...
Izhar Rahim   +4 more
semanticscholar   +1 more source

An Electro-optical Hybrid Encryption Method based on MD5 Verification

open access: yesGuangtongxin yanjiu, 2022
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran   +5 more
doaj   +3 more sources

Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13

open access: yesBuana Information Technology and Computer Sciences, 2020
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj   +1 more source

Inverting Cryptographic Hash Functions via Cube-and-Conquer [PDF]

open access: yesJ. Artif. Intell. Res. Vol. 81 (2024), 2022
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 is a more secure 64-step extension of MD4. Both MD4 and MD5 are vulnerable to practical collision attacks, yet it is still not realistic to invert them, i.e., to find a ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy