scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System

TL;DR: Apart from increasing the security, client trust and availability of the system, distribution of power can also increase its functionality, as it is demonstrated.
Proceedings ArticleDOI

A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases

TL;DR: In this paper, the authors present column-level database encryption as the only solution that is capable of protecting against external and internal threats, and at the same time meeting all regulatory requirements.
Proceedings Article

SNP: an interface for secure network programming

TL;DR: SNP provides a high-level abstraction for secure end-to-end network communications that hides the details of GSS-API as well as the cryptographic sublayer from the application programmers, thus preventing accidental or intentional disclosure by an application program.
Dissertation

Matching with Mismatches and Assorted Applications

TL;DR: A practical algorithm for “universal” delta compression (often called “feedback-free file synchronization”) which can operate in the presence of multiple indels and a large number of substitutions is given.
Journal ArticleDOI

Review: A survey of secure protocols in Mobile IPv6

TL;DR: This paper presents a state-of-the art survey of security protocols in MIPv6, and proposes taxonomy, and comparative study that does not exist in the surveys in the literature.