Results 31 to 40 of about 12,815 (252)
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi+2 more
doaj +2 more sources
Improved collision detection of MD5 with additional sufficient conditions
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang+6 more
doaj +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed+8 more
wiley +1 more source
One of the aspects of information security that can be done for a system is by adding security to a system, if using Base64 with static Sha-1 and Md5 hashing there is little possibility of data theft by hackers because they have been given layered ...
Implementasi Kombinasi+9 more
semanticscholar +1 more source
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee+3 more
wiley +1 more source
Data Storage Security in Cloud Computing Using AES Algorithm and MD5 Algorithm
: The proposed method uses cryptographic techniques to maintain security as security is a critical issue for the cloud, and keeping secure data is a major concern today. Overload due to data duplication is a new challenge for clouds.
V. Varma+4 more
semanticscholar +1 more source
Komparasi Fungsi Hash Md5 Dan Sha256 Dalam Keamanan Gambar Dan Teks
Implementasi ilmu kriptografi menjadi semakin sering digunakan seiring dengan daruratnya keamanan data. Ilmukriptografi yang di dalamnya terdapat fungsi hash mengubah data menjadi sebuah nilai representasi agar data yang dimaksudtidak dapat dengan mudah ...
Izhar Rahim+4 more
semanticscholar +1 more source
An Electro-optical Hybrid Encryption Method based on MD5 Verification
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran+5 more
doaj +3 more sources
Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj +1 more source
Inverting Cryptographic Hash Functions via Cube-and-Conquer [PDF]
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 is a more secure 64-step extension of MD4. Both MD4 and MD5 are vulnerable to practical collision attacks, yet it is still not realistic to invert them, i.e., to find a ...
arxiv +1 more source