Author :
Yong-Xia, Zhao ; Ge, Zhen
Author_Institution :
Inf. Eng. Sch., Wuhan Univ. of Sci. & Technol., Wuhan, China
Abstract :
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its validity.
Keywords :
cryptography; MD5 algorithm; MD5 encryption; hash; irreversible algorithm; message digest; program code; Algorithm design and analysis; Computer networks; Cryptography; Data security; Encoding; IP networks; Information security; Information technology; Paper technology; Safety;
Conference_Titel :
Multimedia and Information Technology (MMIT), 2010 Second International Conference on
Conference_Location :
Kaifeng
Print_ISBN :
978-0-7695-4008-5
Electronic_ISBN :
978-1-4244-6602-3
DOI :
10.1109/MMIT.2010.186