Current location - Quotes Website - Personality signature - Introduction to md5 (origins)
Introduction to md5 (origins)

/view/7636.html?wtp=tt

The full name of md5 is message-digest algorithm 5 (message-digest algorithm), which was developed by mit laboratory for computer science in the early 1990s. Developed by Ronald L. Rivest of RSA Data Security Inc. and developed from md2, md3 and md4. Its function is to allow large-capacity information to be "compressed" into a confidential format (that is, to convert a byte string of any length into a large integer of a certain length) before signing the private key with digital signature software. Whether it is md2, md4 or md5, they all need to obtain a random length of information and generate a 128-bit information digest. Although the structures of these algorithms are more or less similar, the design of md2 is completely different from md4 and md5. That is because md2 is designed and optimized for 8-bit machines, while md4 and md5 are designed for 32-bit computers. The descriptions of these three algorithms and the C language source code are described in detail in Internet RFCS 1321 (/ was established to publicly solicit attacks specifically targeting MD5. The website announced on August 17, 2004: "Chinese researchers discovered The collision of the complete MD5 algorithm was announced; Wang, Feng, Lai and Yu announced the collision of several Hash functions such as MD5, MD4, HAVAL-128, and RIPEMD-128. This is the most substantial research progress in the field of cryptography in recent years. Their technology can find MD5 collisions within hours... As a result of this landmark discovery, the MD5CRK project will be completed within the next 48 hours."

MD5 uses a hash function. The most widely used irreversible encryption algorithms in computer networks include the MD5 algorithm invented by RSA and the secure hash algorithm SHA recommended by the National Institute of Technology Standards.< /p>