Results 81 to 90 of about 164,602 (198)

Finding Hash Collisions Efficiently in MD5

open access: yes, 2023
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire   +1 more source

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

Differential Fault Analysis on the MD5 Compression Function

open access: yesJournal of Computers, 2013
The MD5, proposed by R. Riverst in 1992, is a widely used hash function with Merkle-Damgard structure. In the literature, many studies have been devoted to classical cryptanalysis on the MD5, such as the collision attack, the preimage attack etc. In this paper, we propose a new differential fault analysis on the MD5 compression function in the word ...
Zhi Tao   +5 more
openaire   +2 more sources

Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks

open access: yesRevista UIS Ingenierías, 2013
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez   +2 more
doaj  

Extracting a Salt from an MD5 Hash

open access: yes, 2013
This document shows how a salt was extracted from MD5-hashed paswords, based off the Anonymous leak of 800+K records from think-tank Stratfor.
openaire   +2 more sources

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

Aspects of a Watermark Solution [PDF]

open access: yes
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU   +2 more
core  

Home - About - Disclaimer - Privacy