scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Simplifying data integration: the design of the desert software development environment

TL;DR: The Desert environment has been created to demonstrate that the facilities typically associated with expensive data integration can be provided inexpensively in an open framework.
Proceedings ArticleDOI

Scalable data naming for application level framing in reliable multicast

TL;DR: A new data naming scheme is proposed that toss the structure of apphcation data to the transport layer, thereby mcing the ~\TrXbti@ of= apphcations’ r&abti@ and ordering se mantiw.
Proceedings Article

A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces

TL;DR: A network layer waypoint (3rd-party network agent) service called AVES is proposed that can provide general connectivity and does not require any change to existing IP hosts or IP network routers for easy deployment.
Journal ArticleDOI

Building access control policy model for privacy preserving and testing policy conflicting problems

TL;DR: A purpose-based access control model in distributed computing environment for privacy preserving policies and mechanisms is proposed, and algorithms for policy conflicting problems are described.
Book

Open Systems Networking: Tcp/Ip and Osi

TL;DR: This book compares the TCP/IP and OSI architectures and examines each of the protocol layers, using a "top-down" approach, which deals first with the user-visible distributed applications (such as electronic mail, directories, and network management) and then with the way in which these applications are supported by lower-layer networking protocols.