Results 81 to 90 of about 164,602 (198)
Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation [PDF]
Yoon-Su Jeong, Sung-Hee Woo, Sang-Ho Lee
openalex +1 more source
Finding Hash Collisions Efficiently in MD5
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire +1 more source
Chosen-Prefix Collisions on AES-like Hashing
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen+3 more
doaj +1 more source
Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC [PDF]
R. Lakshmana Kumar+2 more
openalex +1 more source
Differential Fault Analysis on the MD5 Compression Function
The MD5, proposed by R. Riverst in 1992, is a widely used hash function with Merkle-Damgard structure. In the literature, many studies have been devoted to classical cryptanalysis on the MD5, such as the collision attack, the preimage attack etc. In this paper, we propose a new differential fault analysis on the MD5 compression function in the word ...
Zhi Tao+5 more
openaire +2 more sources
ANALYSIS OF CRYPTOGRAPHIC STRENGTH OF THE MODIFIED MD5 ALGORITHM [PDF]
Valentin Telegin
openalex +1 more source
Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez+2 more
doaj
Extracting a Salt from an MD5 Hash
This document shows how a salt was extracted from MD5-hashed paswords, based off the Anonymous leak of 800+K records from think-tank Stratfor.
openaire +2 more sources
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo+2 more
core
Aspects of a Watermark Solution [PDF]
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU+2 more
core