2012
DOI: 10.5121/ijcis.2012.2101
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalyzing of Message Digest Algorithms MD4 and MD5

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…The process of creation of digital signature [6] has two major functions, one is signing and the other is sealing with a key. Signing is otherwise a mathematical summary or a hash code or simply a Message Digest (MD) [7]. It is a hexadecimal number that is mainly created by hashing formulas.…”
Section: Message Digestmentioning
confidence: 99%
See 4 more Smart Citations
“…The process of creation of digital signature [6] has two major functions, one is signing and the other is sealing with a key. Signing is otherwise a mathematical summary or a hash code or simply a Message Digest (MD) [7]. It is a hexadecimal number that is mainly created by hashing formulas.…”
Section: Message Digestmentioning
confidence: 99%
“…If a single bit of the original message changes then there is a dramatic change in the message digest [7]. The most common cryptographic [8] hash functions that are mainly used are Message Digest-5 (MD-5) [7], SHA-1(Secure hash algorithm-0), SHA-256 [9], SHA-384, SHA-512 [10] etc. The MD5 algorithm bears a message inserted of various lengths and generates a 128 bit-hash code.…”
Section: Message Digestmentioning
confidence: 99%
See 3 more Smart Citations