Powered by Blogger.
RSS
Custom Search
King-Shan

IP

What is MD5 hash..?



MD5 hash….I think you all had listen this word more often,but most of them dont’t know what is it and why is it….
OK i am not going to the detailed information of MD5 because it is somewhat hard to understand,rather than i will say its usage in daily life..
In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value.  MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. …
This MD5 algorithm is developed by RSA Data Security, Inc.,
MD5 is a one-way hash algorithm that takes any length of data and produces a 128 bit “fingerprint” or “message digest”. This fingerprint is “non-reversible”.
Now lets check out the use of MD5 hash with an example..
Lets Suppose i had a kept my ‘back up’ of my pc on a ‘file sharing site’ and i intended to download it for some rezone after some days..
I had successfully downloaded that ‘back up’ file and deleted that file in my ‘ONLINE FILE SHARING ACCOUNT’
Now i tried to install that “back up”,but it wont install(saying there is a error)
Why it happened like that…There may be many reasons for it,like “instability of internet,due to hackers,due to download managers,The file can be tampered due to virus infections,etc…,”
what ever the resone is,I lost my “back up”….
Here come the MD5 hash..
Every file comes with a MD5 hash string.A MD5 hash is nothing but a 32 digit hexadecimal number which can be something as follows
” e25f2d85g2fjet22f52d22f5e5f8a8dj 
This hash is unique for every file irrespective of it’s size and type. That means two files with the same size will not have the same MD5 hash even though they are of same type and size. So MD5 hash can be used to uniquely identify a file.
How to use MD5 hash to check integrity of files..?
Before you download a file first check the “MD5 hash” of that file on the server(you have many online site for it and also many free MD5 programs).Note down the hash and after the file has been downloaded again check the MD5 hash of that file.If the two are same the file is not corrected and the file is in right condition,if the two are not the same then it is ****
I hope this helps, PASS YOUR COMMENTS
King-Shan


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

2 comments:

Unknown said...

Thank you for sharing this wonderful detail about this hashing algorithm. Its a popular as well as useful scheme incorporated in many security applications. Using this detail I have learned a lot about it.
electronic signatures

felisha green said...

This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:

-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change

Email: cybergoldenhacker at gmail dot com

Post a Comment