scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters

IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines

TL;DR: This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators.
Proceedings ArticleDOI

Privacy via pseudorandom sketches

TL;DR: This paper introduces a new technique to describe parts of an individual's data that is based on pseudorandom sketches that guarantee that each individual's privacy is provably maintained and does not rely on any unproven cryptographic conjectures.
Journal ArticleDOI

Securing BGP — A Literature Survey

TL;DR: The Internet's routing architecture and the design of BGP in particular is examined, and no proposal has been seen as offering a combination of adequate security functions, suitable performance overheads and deployable support infrastructure.
Proceedings ArticleDOI

Us vs. Them: Understanding Social Dynamics in Wikipedia with Revert Graph Visualizations

TL;DR: Revert Graph is constructed, a tool that visualizes the overall conflict patterns between groups of users and enables visual analysis of opinion groups and rapid interactive exploration of those relationships via detail drill- downs.
Journal ArticleDOI

A secure address resolution protocol

TL;DR: An architecture for securely resolving IP addresses into hardware addresses over an Ethernet and two protocols: an invite-accept protocol and a request-reply protocol that are designed to overcome the actions of any adversary that can lose sent messages, arbitrarily modify the fields of sent message, and replay old messages is proposed.