MD5, also known as Message Digest 5, is a very important cryptographic function in the world of information security because it plays a very important role by subjecting files to scrutiny and verifying that no changes have been made to them forever. he does.

It is resorted to using the control sum method or Checksum about the symmetry of the groups that need to be checked. They have the disadvantage that they are not able to provide an advantage in coding advanced applications, but still, they are generally suitable for standard files.

way of doing work


The MD5 algorithm is actually a one-way function that takes your phrase and file as input and gives you a string of numbers and letters with a fixed length of 128 bits. How many times the same input is given to this function, you will get the specific and previous output.

But be careful that it will work one-way and you will never reach the input from the output, in certain operations such as password evaluation, of course, with relatively low security and information accuracy of large files that may have been damaged or manipulated during transfer. We can use this algorithm well.

That is, at first, we take the md5 output from the file, and in another space and place, after moving and re-transmitting, we will have the output of this hash function, which must be in harmony with the initial case.

One of the most prominent tools used to use MD5 is the Microsoft FCIV tool, which is a free calculator that helps create a specialized file in its verification. Also, many methods are used to generate and divide letters, symbols, and numbers, such as MD5 PasswordsGenerator and many others, and if the same algorithm is used to access the hash, the same results are automatically generated. More precisely, it is a specialized message authentication protocol for verifying the authenticity of message content.

Date of creation of MD5

The development of MD5 is attributed to Ronald Rivest and was done on the sidelines of the development of the first hash function, MD2, in 1989. In 1990, MD4 was developed to serve 32-bit devices. It was characterized by being faster than the previous version, despite the fact that some problems were attached to it. In 1992 AD, the MD5 hash function was also released for 32-bit devices. Although it is not as fast as MD4, it is more secure than its predecessors, and information shows that there are many proposals to replace it with other encryption tools, including SHA-1, because of the security flaws it introduces. is provided. And its sixth version, MD6, was created in 2008 as a replacement for SHA-3.

Disadvantages of MD5

Improvements in algorithms and various hash functions have led to the discovery of some gaps and weaknesses in MD5, which often revolve around the inability to withstand collisions, as collisions occur if similar values ​​of functions are found to complete the task. MD5 in full and then start hashing the numbers and values ​​individually to meet the goals of popular authentication protocols.

Use cases of MD5

MD5 checksum can be used to perform a test to compare the backups with the original and their compatibility to ensure that no data is lost and destroyed, and it is worth noting that there is. Some cases result in data loss as a result of a connection to the Internet server or virus and hacker attacks, and the similarity of the two hashes shows that the backup copies have been completely downloaded.

How MD5 works?

The information shows that this algorithm resorts to hashing the data in the form of 512-bit blocks (blocks) into 16 words, and the final extracted value is 128 bits. The 512-bit data blocks are processed in completely separate steps, and the resulting value is added to the previous steps, and then The initialization process begins to arrive at a message digest based on 16 consecutive numbers. It is clear that the message goes through four stages to reach the final result.