scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters

Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications

Kaan Yuksel
TL;DR: The main motivation was to prove that universal hash functions can be employed as underlying primitives of MACs in order to provide provable security in ultra-low-power applications such as the next generation self-powered sensor networks.
Journal ArticleDOI

An Efficient Security System for CABAC Bin-Strings of H.264/SVC

TL;DR: The security and statistical analysis performed verify the effectiveness of the proposed security system for H.264/SVC and present a solution for the bit-rate and format compliance problems by careful selection of entropy coder syntax elements (bin-strings) for selective encryption (SE).
Book ChapterDOI

Hold your sessions: an attack on java session-id generation

TL;DR: A cryptanalysis of Java Servlet 128-bit session-id's and an efficient practical prediction algorithm is presented and a novel, general space-time tradeoff for secure pseudo random number generator attacks is presented.

Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)

TL;DR: This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver and the new parameters are used to establish the shared keys.

Stream Control Transmission Protocol Applicability Statement

Lode Coene
TL;DR: This document describes the applicability of the Stream Control Transmission Protocol (SCTP), and contrasts SCTP with the two dominant transport protocols, User Datagram Protocol (UDP) & Transmission Control Protocol (TCP).