Function - MD5 Hash function (Message Digest 5)

Consistent Hashing

About

MD5 (Message Digest 5) is a hash function

The primary function of an MD5 algorithm is to generate a message digest value (128-bit cryptographic), hence the name.

Security

md5 is not a secure hash algorithm. 1)

md5 is only safe for non security purposes because it's not difficult enough to create a hash collision (ie to create two different input texts that hash to the same value)

Properties

Length

The length is a fixed value of 128 bits

  • ie 32 hexadecimal (1 hexa = 4 bit)
  • ie 32 hexadecimal characters.

Tool

Tool

md5sum file

Library

var crypto = require('crypto');
var name = 'secret';
var hash = crypto.createHash('md5').update(name).digest('hex');
console.log(hash); 





Discover More
Authentication - HTTP Digest Access Authentication

Digest access authentication is an http authentication method based on authorization entry. It is intended (as a security trade-off) to replace unencrypted HTTP basic access authentication. It is not,...
Odds Of A Hash Collision
Collisions of Hash or Identifier Generation

A collision happens when a function produces the same result while it should be unique. In a hash function, it happens when two different inputs produces the same hash In a identifier generator, it...
Consistent Hashing
Cryptography - Hash

A hash function is an encryption crypto algorithm that takes as data as input (possibly large and of variable-sized) and produces a short fixed-length integer value (generally printed as an hexadecimal...
Checksum
Cryptography - Message Digest (checksum|hash) (sha1|md5)

A message digest is the output of hash function (also known as a checksum). The input is known as the message (ie a piece of data: file, payload). It is used to verify that the data has not been altered...
Etag - An unique identifier for a HTTP resource

The ETag HTTP response header is an identifier for a specific version of a resource. A etag comparison determines whether two representations of a resource are the same and is therefore similar to a hash...
Consistent Hashing
File Checksum Integrity Verifier utility tool

A windows command line utility to compute a file digest with a md5 and sha1 hash. fciv...
Hash-based message authentication code (hmac)

HMAC or Hash-based message authentication code is a specific type of message authentication code (MAC) involving: a cryptographic hash function (SHA or MD5) and a secret cryptographic key. private...
Kerberos - Encryption type

encryption in Kerberos Encryption is used for both the ticket-granting-ticket and session tickets. There are three components: the client, the KDC, and the server. Each one may support a...
PassPhrase (Longer password)

A passphrase is something you know and is like a password except: it is longer (not always true) it's not coupled to a login In the early days passwords on Unix system were limited to 8 characters,...
What is a UUID - Universally Unique IDentifier - (also known as GUID) ?

UUID (Universally or Global Unique IDentifier) are generated identifiers that are guaranteed to be unique and avoid collision



Share this page:
Follow us:
Task Runner