scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Homomorphic fingerprints under misalignments: sketching edit and shift distances

TL;DR: This paper presents the first linear sketch that is robust to a small number of alignment errors and can be used to determine whether two files are within a small Hamming distance of being a cyclic shift of each other.
Journal ArticleDOI

Prototype of a secure wireless patient monitoring system for the medical community

TL;DR: An extensive evaluation of the framework of a 6-node sensor test-bed is presented, measuring scalability and robustness as the number of sensors and the per node data rate are varied, showing that the proposed framework is a scalable, robust, reliable and secure solution for medical applications.
Journal ArticleDOI

DTD-Diff: A change detection algorithm for DTDs

TL;DR: This paper presents a novel algorithm called DTD-Diff to detect the changes to DTDs that defines the structure of a set of XML documents, and shows that converting DTD to XML schema (XSD) and detecting the changes using existing XML change detection algorithms is not a feasible option.
Proceedings ArticleDOI

Authentication of Signaling in VoIP Applications

TL;DR: This paper proposes a scheme for authenticating the end users identities with the outbound proxy server in that domain with the help of the registrar server based on end users public key infrastructure (PKI) certificate and strong one way hash function.
Journal ArticleDOI

Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure

TL;DR: This paper formulate the trade-off between the nested certification overhead and the time improvement on certificate path verification, and numerically analyzed for a 4-level 20-ary balanced tree-shaped PKI.