Message Digest (MD5) Algorithm and Secure Hash Algorithm (SHA). Furht, B., editor In Encyclopedia of Multimedia, pages 420–420. Springer US, 2008. 00000
Message Digest (MD5) Algorithm and Secure Hash Algorithm (SHA) [link]Paper  abstract   bibtex   
DefinitionMessage Digest and Secure Cash are the standard algorithms to provide data security for multimedia authentication.The MD5 algorithm takes as input a message of arbitrary length and produces as output a 128-bit “fingerprint” or “message digest” of the input message [1]. MD5 is currently a standard, Internet Engineering Task Force (IETF Request for Comments (RFC 1321. In comparison, MD5 is not quite as fast as the MD4 algorithm, but offers much more assurance of data security.SHA is considered to be the successor to MD5. The Federal Information Processing Standard (FIPS 180-2) specifies four secure hash algorithms (SHA) — SHA-1, SHA-256, SHA-384, and SHA-512 [2]. As shown in Table 1, all four of the algorithms are iterative, one-way hash functions that can process a message with a maximum length of 264- to 2128-bits to produce a 160- to 512-bit condensed representation called a message digest. The input message is processed in 512- to 1,024-bit blocks. The four algori ...
@incollection{furht_message_2008,
	title = {Message {Digest} ({MD5}) {Algorithm} and {Secure} {Hash} {Algorithm} ({SHA})},
	copyright = {©2008 Springer-Verlag},
	isbn = {978-0-387-74724-8 978-0-387-78414-4},
	url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_110},
	abstract = {DefinitionMessage Digest and Secure Cash are the standard algorithms to provide data security for multimedia authentication.The MD5 algorithm takes as input a message of arbitrary length and produces as output a 128-bit “fingerprint” or “message digest” of the input message [1]. MD5 is currently a standard, Internet Engineering Task Force (IETF Request for Comments (RFC 1321. In comparison, MD5 is not quite as fast as the MD4 algorithm, but offers much more assurance of data security.SHA is considered to be the successor to MD5. The Federal Information Processing Standard (FIPS 180-2) specifies four secure hash algorithms (SHA) — SHA-1, SHA-256, SHA-384, and SHA-512 [2]. As shown in Table 1, all four of the algorithms are iterative, one-way hash functions that can process a message with a maximum length of 264- to 2128-bits to produce a 160- to 512-bit condensed representation called a message digest. The input message is processed in 512- to 1,024-bit blocks. The four algori ...},
	language = {en},
	urldate = {2016-05-03},
	booktitle = {Encyclopedia of {Multimedia}},
	publisher = {Springer US},
	editor = {Furht, Borko},
	year = {2008},
	note = {00000},
	pages = {420--420}
}
Downloads: 0