Open AccessProceedings Article
The MD5 Message-Digest Algorithm
Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.Abstract:
This document describes the MD5 message-digest algorithm. The
algorithm takes as input a message of arbitrary length and produces as
output a 128-bit "fingerprint" or "message digest" of the input. This
memo provides information for the Internet community. It does not
specify an Internet standard.read more
Citations
More filters
Journal ArticleDOI
A Software-Optimized Encryption Algorithm
Phillip Rogaway,Don Coppersmith +1 more
TL;DR: The software-efficient encryption algorithm SEAL 3.0 is described, which stretches a 32-bit position index into a long, pseudorandom string that can be used as the keystream of a Vernam cipher.
Journal ArticleDOI
On the security of iterated message authentication codes
Bart Preneel,P. C. van Oorschot +1 more
TL;DR: A new MAC forgery attack applicable to all deterministic iterated MAC algorithms is presented, which requires on the order of 2/sup n/2/ known text-MAC pairs for algorithms with n bits of internal memory, as compared to the best previous general attack which required exhaustive key search.
Book ChapterDOI
KryptoKnight Authentication and Key Distribution System
TL;DR: KryptoKnight was designed with the goal of providing network security services with a high degree of compactness and flexibility, which allows it to secure communication protocols at any layer, without requiring any major protocol augmentations in order to accommodate security-related information.
Book ChapterDOI
Electronic Lottery Tickets as Micropayments
TL;DR: A new micropayment scheme based on the use of “electronic lottery tickets” is presented, which is exceptionally efficient since the bank handles only winning tickets, instead of handling each microp payment.
Book
Internet Privacy Enhanced Mail
TL;DR: Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure that combines to provide users with a facility in which message confidentiality, authenticity, and integrity can be effected.