Penguin

Differences between current version and predecessor to the previous major change of MD5.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 9 Last edited on Sunday, March 1, 2009 9:01:58 pm by AristotlePagaltzis
Older page: version 8 Last edited on Saturday, February 28, 2009 5:10:51 pm by LawrenceDoliveiro Revert
@@ -1,52 +1,11 @@
-MD5 (Message Digest [Algorithm ]) is a CryptographicHash algorithm
+An [Acronym ] for __M__essage __D__igest 5
  
-The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is ComputationallyInfeasible to produce two messages having the same message digest , or to produce any message having a given prespecified target message digest . The MD5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA .[1
+It is one of a family of CryptographicHash [Algorithm]s, and produces a 128-bit digest (or "fingerprint") from arbitrarily long input data streams . It is based on MD2 , but is faster . It is [nowadays considered weak | http://www.schneier.com/blog/archives/2005/06/more_md5_collis.html]. [Do not use it in applications where you might need to guard against malicious modification of your data | http://www .schneier.com/blog/archives/2005/03/more_hash_funct.html ].  
  
-Basically MD5 is an easy way to verify the integrity of a piece of data.  
+!! See also  
  
-Some common uses of MD5 are for  
- * HashTable  
-* PasswordEncryption  
-* Making long strings shorter  
-  
- MD5 is nowadays [considered weak |http://www.schneier.com/blog/archives/2005/06/more_md5_collis.html]. [Do not use|http://www.schneier.com/blog/archives/2005/03/more_hash_funct.html] in applications where you might need to guard against malicious modification of your data.  
-  
- http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html  
-  
-[1 ] RFC:1321  
-  
-  
-----  
-From RFC:1321  
-  
-!!!Executive Summary  
-  
-This document describes the MD5 message-digest algorithm. The  
-algorithm takes as input a message of arbitrary length and produces  
-as output a 128-bit "fingerprint" or "message digest" of the input.  
-It is conjectured that it is computationally infeasible to produce  
-two messages having the same message digest, or to produce any  
-message having a given prespecified target message digest. The MD5  
-algorithm is intended for digital signature applications, where a  
-large file must be "compressed" in a secure manner before being  
-encrypted with a private (secret) key under a public-key cryptosystem  
-such as [RSA].  
-  
-The MD5 algorithm is designed to be quite fast on 32-bit machines. In  
-addition, the MD5 algorithm does not require any large substitution  
-tables; the algorithm can be coded quite compactly.  
-  
-The MD5 algorithm is an extension of the MD4 message-digest algorithm.  
-MD5 is slightly slower than MD4, but is more "conservative" in  
-design. MD5 was designed because it was felt that MD4 was perhaps  
-being adopted for use more quickly than justified by the existing  
-critical review; because MD4 was designed to be exceptionally fast,  
-it is "at the edge" in terms of risking successful cryptanalytic  
-attack. MD5 backs off a bit, giving up a little in speed for a much  
-greater likelihood of ultimate security. It incorporates some  
-suggestions made by various reviewers, and contains additional  
-optimizations. The MD5 algorithm is being placed in the public domain  
-for review and possible adoption as a standard.  
+* RFC:1321  
+* [ MD5 Homepage (unofficial) | http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html] 
  
 ---- 
 CategoryAlgorithm