Results 1 to 4 of 4

Thread: What is MD5 hashing in Internet Security?

  1. #1
    Join Date
    Mar 2010
    Posts
    515

    What is MD5 hashing in Internet Security?

    I have a problem in MD5 hashing which is used in Internet security. Can anyone please let me know what the concept of this term in internet security is. I don’t have any idea about it and its algorithm. So, if anyone having any information then please let me know as soon as possible. I have heard that it is a very important aspect of internet security, but i haven't yet understood how can it be useful? so, if anyone knows about it then please let me know.

  2. #2
    Join Date
    Nov 2008
    Posts
    1,066

    Re: What is MD5 hashing in Internet Security?

    The message is "padded" (extended) so that its length (in bits) is similar to 448, modulo 512. That is, the message is extended so that it is just 64 bits timid of being a multiple of 512 bits long. Padding is always performed, even if the length of the message is already similar to 448, modulo 512. Padding is performed as follows: a single "1" bit is appended to the message, and then "0" bits are appended so that the length in bits of the padded message becomes congruent to 448, modulo 512. In all, at least one bit and at most 512 bits are appended.

  3. #3
    Join Date
    Jun 2009
    Posts
    1,112

    Re: What is MD5 hashing in Internet Security?

    A 64-bit representation of 1000 (The message length excluding padded one) is appended to the result of the previous step. In the unlikely event that the message length is greater than 2^64, then only the low-order 64 bits of b are used. At this point the resulting message i.e. message+padding+length has a length that is an exact multiple of 512 bits. Equivalently, this message has a length that is an exact multiple of 16 (32-bit ) words.

  4. #4
    Join Date
    May 2009
    Posts
    1,084

    Re: What is MD5 hashing in Internet Security?

    The MD5 algorithm has been cautiously examined for weak point. It is, however, a comparatively new algorithm and further security analysis is of course defensible, as is the case with any new suggestion of this sort. I think that this is examined for the limitations which are examined by the MD5. I think that this is something which is been in Digital signature also. If you go through these points you definitely have an good idea about MD5 hashing.

Similar Threads

  1. Replies: 5
    Last Post: 01-03-2012, 12:38 PM
  2. Replies: 4
    Last Post: 27-04-2011, 11:10 AM
  3. Secure MD5 hashing in PHP
    By Miquel in forum Software Development
    Replies: 4
    Last Post: 04-01-2011, 12:46 AM
  4. Hashing Method in JSP
    By Level8 in forum Software Development
    Replies: 4
    Last Post: 06-03-2010, 10:38 AM
  5. Replies: 0
    Last Post: 15-07-2008, 12:47 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,044,582.60146 seconds with 16 queries