The full name of MD5 is Message-digest Algorithm 5, which is used to ensure the integrity and consistency of information transmission. It was developed by Ronald L. Rivest and RSA Data Security Company in the Computer Science Laboratory of Massachusetts Institute of Technology in the early 1990s, and was developed by MD2, MD3 and MD4. Its function is to "compress" a large amount of information into a secret format (that is, convert a byte string of any length into a large integer of a certain length) before signing the private key with digital signature software. No matter MD2, MD4 or MD5, it is necessary to get a random length of information and generate a 128-bit information summary. Although the structures of these algorithms are more or less similar, the design of MD2 is completely different from that of MD4 and MD5, because MD2 is optimized for 8-bit computers, while MD4 and MD5 are designed for 32-bit computers. The internet RFC 132 1(/ is set to openly solicit attacks specifically targeting MD5, and the website announced on August 17, 2004: "China researchers found that the complete MD5 algorithm collided; Wang, Feng, Lai and Yu announced the collision of several Hash functions: MD5, MD4, HAVAL- 128, RIPEMD- 128. This is the most substantial research progress in the field of cryptography in recent years. Using their technology, MD5 conflicts can be found in a few hours. ..... Because of this landmark discovery, the MD5CRK project will end in the next 48 hours ".
MD5 uses hash function, and the irreversible encryption algorithms widely used in computer networks include MD5 algorithm invented by RSA company and secure hash algorithm SHA proposed by National Institute of Technical Standards.