scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Internet Routing Architectures, Second Edition

TL;DR: This invaluable reference provides realistic, practical design solutions from Cisco Systems-the Internetworking authority teaching how to construct and support robust ISP connections to the Internet.
Proceedings ArticleDOI

Performance analysis of MD5

TL;DR: An analysis of the speed at which MD5 can be implemented in software and hardware, and whether its use interferes with high bandwidth networking is discussed.
Journal ArticleDOI

Authenticating the query results of text search engines

TL;DR: This work formulate the properties that define a correct result, map the task of processing a text search query to adaptations of existing threshold-based algorithms, and devise an authentication scheme for checking the validity of a result.
Proceedings ArticleDOI

A hybrid approach for face template protection

TL;DR: This work proposes a three-step cancelable framework which is a hybrid approach for face template protection, based on the random projection, class distribution preserving transform and hash function, which maintains good template discriminability, resulting in good recognition performance.

Cryptography for Ultra-Low Power Devices

TL;DR: The goal of this dissertation is to develop a suite of cryptographic functions for authentication, encryption and integrity that is specifically fashioned to the needs of ultra-low power devices.