Differences between current version and predecessor to the previous major change of MD5.
Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 9 | Last edited on Sunday, March 1, 2009 9:01:58 pm | by AristotlePagaltzis | |
Older page: | version 8 | Last edited on Saturday, February 28, 2009 5:10:51 pm | by LawrenceDoliveiro | Revert |
@@ -1,52 +1,11 @@
-MD5 (Message Digest
[Algorithm
]) is a CryptographicHash algorithm
.
+An
[Acronym
] for __M__essage __D__igest 5
.
-The algorithm takes as input
a message
of arbitrary length
and produces as output
a 128-bit "fingerprint" or "message digest" of the
input. It is conjectured that it is ComputationallyInfeasible to produce two messages having the same message digest
, or to produce any message having a given prespecified target message digest
. The MD5 algorithm
is intended for digital signature
applications,
where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA
.[1
]
+It is one of
a family
of CryptographicHash [Algorithm]s,
and produces a 128-bit digest (or
"fingerprint") from arbitrarily long
input data streams
. It is based on MD2
, but is faster
. It
is [nowadays considered weak | http://www.schneier.com/blog/archives/2005/06/more_md5_collis.html]. [Do not use it in
applications where you might need to guard against malicious modification of your data | http://www
.schneier.com/blog/archives/2005/03/more_hash_funct.html
].
-Basically MD5 is an easy way to verify the integrity of a piece of data.
+!! See also
-Some common uses of MD5 are for
-
* HashTable
-* PasswordEncryption
-* Making long strings shorter
-
-
MD5 is nowadays [considered weak
|http://www.schneier.com/blog/archives/2005/06/more_md5_collis.html]. [Do not use|http://www.schneier.com/blog/archives/2005/03/more_hash_funct.html] in applications where you might need to guard against malicious modification of your data.
-
-
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
-
-[1
] RFC:1321
-
-
-----
-From RFC:1321
-
-!!!Executive Summary
-
-This document describes the MD5 message-digest algorithm. The
-algorithm takes as input a message of arbitrary length and produces
-as output a 128-bit "fingerprint" or "message digest" of the input.
-It is conjectured that it is computationally infeasible to produce
-two messages having the same message digest, or to produce any
-message having a given prespecified target message digest. The MD5
-algorithm is intended for digital signature applications, where a
-large file must be "compressed" in a secure manner before being
-encrypted with a private (secret) key under a public-key cryptosystem
-such as [RSA].
-
-The MD5 algorithm is designed to be quite fast on 32-bit machines. In
-addition, the MD5 algorithm does not require any large substitution
-tables; the algorithm can be coded quite compactly.
-
-The MD5 algorithm is an extension of the MD4 message-digest algorithm.
-MD5 is slightly slower than MD4, but is more "conservative" in
-design. MD5 was designed because it was felt that MD4 was perhaps
-being adopted for use more quickly than justified by the existing
-critical review; because MD4 was designed to be exceptionally fast,
-it is "at the edge" in terms of risking successful cryptanalytic
-attack. MD5 backs off a bit, giving up a little in speed for a much
-greater likelihood of ultimate security. It incorporates some
-suggestions made by various reviewers, and contains additional
-optimizations. The MD5 algorithm is being placed in the public domain
-for review and possible adoption as a standard.
+* RFC:1321
+* [
MD5 Homepage (unofficial)
| http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html]
----
CategoryAlgorithm