scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Software-Optimized Encryption Algorithm

TL;DR: The software-efficient encryption algorithm SEAL 3.0 is described, which stretches a 32-bit position index into a long, pseudorandom string that can be used as the keystream of a Vernam cipher.
Journal ArticleDOI

On the security of iterated message authentication codes

TL;DR: A new MAC forgery attack applicable to all deterministic iterated MAC algorithms is presented, which requires on the order of 2/sup n/2/ known text-MAC pairs for algorithms with n bits of internal memory, as compared to the best previous general attack which required exhaustive key search.
Book ChapterDOI

KryptoKnight Authentication and Key Distribution System

TL;DR: KryptoKnight was designed with the goal of providing network security services with a high degree of compactness and flexibility, which allows it to secure communication protocols at any layer, without requiring any major protocol augmentations in order to accommodate security-related information.
Book ChapterDOI

Electronic Lottery Tickets as Micropayments

TL;DR: A new micropayment scheme based on the use of “electronic lottery tickets” is presented, which is exceptionally efficient since the bank handles only winning tickets, instead of handling each microp payment.
Book

Internet Privacy Enhanced Mail

TL;DR: Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure that combines to provide users with a facility in which message confidentiality, authenticity, and integrity can be effected.