CS 685
Advanced Software Projects

Hashing Function - MD5


By Farhad Ahmed Sagar

Cryptography

Cryptographic Hash Functions take data input (or massage) and generate a fixed size result (or digest). The result is called Checksome. It is almost impossible to regenerate the input from the result of hash function. One thing to see here is that the hash functions are not encryption because you cannot decrypt the input from the output.


MD 5

One of the most widely used Cryptographic hash Function is MD5 or "message digest 5". MD5 creates a 128-bit message digest from the data input which is typically expressed in 32 digits hexadecimal number. It is widely used to make sure that the transferred le in a software has arrived safely. It is also used in database to store passwords as hash instead of the original input.


MD5