About 13,200 results
Open links in new tab
  1. Why did MD4 replace MD2? - Cryptography Stack Exchange

    Feb 18, 2019 · The MD4 algorithm is being placed in the public domain for review and possible adoption as a standard. There is a clear emphasis on the algorithm's performance: The MD4 …

  2. Is the quality of hash function essential in HKDF?

    Jul 18, 2024 · MD4 has been broken a long time ago. Would using MD4 for HKDF create a vulnerability? Or is the quality of MD4 and other broken hash functions like MD5 and SHA-1 …

  3. What's the state of the art attack to get the first pre-image on MD4?

    What's the state of the art attack to get the first pre-image on MD4? Ask Question Asked 12 years, 7 months ago Modified 3 years ago

  4. CRC32 catches errors, but then what's the point of SHA?

    Oct 6, 2019 · If crc or CRC32 is specially designed to catch errors, then what's the point of SHA or md4-5 or any other hashing function? What I did was, I had a 190 mb png file (rendered in 16k …

  5. collision resistance - Is the HMAC of a broken hash such as MD2, …

    Feb 10, 2021 · As we know, MD5 and SHA1 (to some extent) are broken, and older algorithms like SHA0 or MD4 and MD2 are very broken. Does this also imply that the corresponding …

  6. What Happened to MD3 in Rivest's Series of Hash Functions?

    Jan 22, 2024 · Ronald Rivest designed MD2, MD4, MD5, and MD6, but what about MD3? Was it skipped? Or perhaps kept private and never publicly released? (edit: found a related question)

  7. How is SHA1 different from MD5? - Cryptography Stack Exchange

    MD5 and SHA-1 have a lot in common; SHA-1 was clearly inspired on either MD5 or MD4, or both (SHA-1 is a patched version of SHA-0, which was published in 1993, while MD5 was …

  8. How were the constants chosen in round 2 and 3 in MD4?

    Mar 1, 2019 · Just reading Ron Rivest's explanation of MD4 the hash uses two round constants one $ \text {5A827999}$ on round $2$ and the other $\text {6ED9EBA1}$ on round $3$.

  9. Is there a complete list of Signature Algorithm names?

    Aug 31, 2017 · @fgrieu: PKCS1v1 over 20 years ago assigned ` {md2,md4,md5}withRSAEncryption' as names (and OIDs in an arc belonging to RSADSI) for …

  10. What is the difference between SHA-3 and SHA-256?

    Mar 26, 2019 · I am new about cryptography, I learned that SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST. But I …