Results 31 to 40 of about 160,083 (235)
Inverting Cryptographic Hash Functions via Cube-and-Conquer [PDF]
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 is a more secure 64-step extension of MD4. Both MD4 and MD5 are vulnerable to practical collision attacks, yet it is still not realistic to invert them, i.e., to find a ...
arxiv +1 more source
PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj +1 more source
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng+9 more
doaj +1 more source
Is a Quantum Gravity Era Necessary? [PDF]
We present the first published framework of the entirety of cosmological history which is thoroughly classical (without any quantum-gravitational era or singularities) and which passes all the known extensive consistency checks on such a model, and discuss some of its possible cosmological implications, such as its ability to account for the matter ...
arxiv +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba+3 more
doaj +1 more source
تحسين خوارزمية MD5 بالاعتماد على عدة طرق
المستخلص خوارزميات Hash هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية . هذا البحث يعمل على تعزيز خوارزميةMD5 ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5 هو استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان+1 more
doaj +1 more source
Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile
Abstrak- Tulisan ini membahas tentang disain Aplikasi Algoritma MD5. Dalam desain ini dibuat model kirim dan terima SMS aman. Dari model ini bisa dibuat desain aplikasi berbasis objek menggunakan Unified Modeling Language (UML), State Machine untuk ...
Zaiful Bahri+2 more
doaj +3 more sources
Applying Grover's Algorithm to Hash Functions: A Software Perspective [PDF]
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource requirements of conducting a preimage attack with Grover's Algorithm. We introduce an improvement to
arxiv +1 more source
Issuing Digital Signatures for Integrity and Authentication of Digital Documents
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the ...
Hassan Kassim Albahadily+3 more
doaj +1 more source