Home
Main website
Display Sidebar
Hide Ads
Recent Changes
View Source:
MD5
Edit
PageHistory
Diff
Info
LikePages
You are viewing an old revision of this page.
View the current version
.
MD5 (Message Digest [Algorithm]) is a CryptographicHash algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA.[1] Basically MD5 is an easy way to verify the integrity of a piece of data. Some common uses of MD5 are for * HashTable * PasswordEncryption * Making long strings shorter http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html [1] RFC:1321 ---- From RFC:1321 !!!Executive Summary This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as [RSA]. The MD5 algorithm is designed to be quite fast on 32-bit machines. In addition, the MD5 algorithm does not require any large substitution tables; the algorithm can be coded quite compactly. The MD5 algorithm is an extension of the MD4 message-digest algorithm. MD5 is slightly slower than MD4, but is more "conservative" in design. MD5 was designed because it was felt that MD4 was perhaps being adopted for use more quickly than justified by the existing critical review; because MD4 was designed to be exceptionally fast, it is "at the edge" in terms of risking successful cryptanalytic attack. MD5 backs off a bit, giving up a little in speed for a much greater likelihood of ultimate security. It incorporates some suggestions made by various reviewers, and contains additional optimizations. The MD5 algorithm is being placed in the public domain for review and possible adoption as a standard. ---- CategoryAlgorithm
8 pages link to
MD5
:
CryptographicHash
SHA1
AptNotes
SCons
GPG/PGPNotes
MeetingTopics.2005-08-22
MakeToSCons
PostgreSQLNotes