English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

3 answers

MD5 is a checksum algorithm that uses shifts, masks, and mixing to create a digest of a message or data stream. It is non-reversable unless the data digested is shorter than the final key. It is used most often to check the integrity of data, and is only secure to the casual observer. Passwords, and other sensitive data that is potentially shorter than 16 bytes in length should use a stronger method. The MD5 algorithm bears many simularities to SHA1 though the latter is considered more secure. The algorithm is a fairly straight forward 4 pass paramuter method, with precalculated polynomial products applied at each operation. The polynomials, in the form of 32 bit integers, server to obfuscate the data content as well as mix the bits so that no single region of the message dominates the apearence of the key, compare this to a CRC-32, which tends to prefer later bits in the message.

See the link to the source for a more detailed description.

2007-05-17 23:35:05 · answer #1 · answered by chronusmcgee 1 · 0 0

i think of it has to do with the waterfilling situation. it could additionally be referred to as grasping optimization. in fact you have countless distinctive buckets resembling distinctive stages or frequencies, and each bucket has a definite purpose functionality with which you make certain how plenty to furnish to each bucket. the extra advantageous area a bucket has, the extra the grasping set of rules will use it. subsequently that is grasping.

2016-12-29 09:58:51 · answer #2 · answered by ? 3 · 0 0

Try this link.

2007-05-17 22:49:11 · answer #3 · answered by AnalProgrammer 7 · 0 0

fedest.com, questions and answers