Difference between pages "File:Zaurus-front.jpg" and "MD5"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(Updated text)
 
Line 1: Line 1:
Photo of a [[Sharp]] [[Zaurus]] and stylus, running [[OpenZaurus]] with [[OPIE]].
+
The '''Message-Digest algorithm 5''' ('''MD5''') is a cryptographic [[hash|hash function]] that produces a 128-bit hash value. Originally developed in 1991, much as has been written about this algorithm. As such, this article concentrates only on its application to computer forensics.
  
'''Author''': [http://en.wikipedia.org/wiki/User:Wapcaplet Eric Pierce]
+
== Tools ==
  
'''License''': [http://en.wikipedia.org/wiki/Wikipedia:Text_of_the_GNU_Free_Documentation_License GFDL 1.2]
+
On most [[Unix]] systems the tools [[md5]] or [[md5sum]] can be used to compute the MD5 hash of a file or device. [[md5deep]] can compute MD5 hashes of whole directory trees.
  
'''Source''': [http://commons.wikimedia.org/wiki/Image:Sharp_Zaurus.jpg Wikimedia Commons]
+
== Weaknesses ==
 +
 
 +
Recently some cryptographic weaknesses have been found in MD5. Tool developers should avoid using MD5 in new products in favor of other hash functions like [[SHA-1]] or [[SHA-256]].
 +
 
 +
== External Links ==
 +
 
 +
* [http://en.wikipedia.org/wiki/Md5 Wikipedia: MD5]
 +
* [http://deepbyte.com/blog/2006/02/is_the_md5_hash_unreliable.html Is the MD5 hash unreliable?]

Revision as of 01:08, 27 February 2007

The Message-Digest algorithm 5 (MD5) is a cryptographic hash function that produces a 128-bit hash value. Originally developed in 1991, much as has been written about this algorithm. As such, this article concentrates only on its application to computer forensics.

Tools

On most Unix systems the tools md5 or md5sum can be used to compute the MD5 hash of a file or device. md5deep can compute MD5 hashes of whole directory trees.

Weaknesses

Recently some cryptographic weaknesses have been found in MD5. Tool developers should avoid using MD5 in new products in favor of other hash functions like SHA-1 or SHA-256.

External Links

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current23:43, 18 March 2013Thumbnail for version as of 23:43, 18 March 2013200 × 299 (7 KB)Maintenance script (Talk)Importing image file
  • You cannot overwrite this file.

The following page links to this file: