MD5 - or detailed Message Digest Algorithm 5 - is a cryptographic function that generates a checksum (checksum) from any string. It was developed in 1991 by Prof. Ronald Rivest at MIT as the successor to the MD4 algorithm. MD5 is a so-called hash function: a cryptographic function as generator generates a 128-bit string, the so-called digest, from any message - a file or a text. From this digest the original message can not be guessed (the so-called one-way property). Finding other messages for which the generator generates the same MD5 hash is also extremely difficult (referred to as collision resistance). For this reason, message digest algorithms such as MD5 are used to check the integrity of data transmissions or to prevent messages from being compromised. Strong cryptographic hash functions are also used to not store passwords in the plaintext or to verify encryption certificates.
The principle behind the MD5 Checksum is the same in all these cases: If the input is changed - the file that has been checked is changed, for example, then the MD5 hash no longer agrees. At the same time, it is almost impossible to determine which input the MD5 checksum has generated. Without the input, someone who happens to have the hash in their hands, so do not begin with the checksum.
The security of MD5 is now very controversial; While some opinions suggest that previous attempts to break encryption are so complex that available complementary security techniques are sufficient, advise others not to use MD5. Several research groups have succeeded in generating so-called collisions, that is to say, pairs of messages which produce the same hash value. This could be falsified, for example SSL certificates. An MD5 generator can still be used for non-critical security-critical tasks, especially if the transmission is not accessible to a large public, or there is no risk of losing thousands of access data. The MD5 checksum should not be transmitted in the same way as the message to be checked - for example, if a download is compromised, the attacker could have modified the MD5 hash to fit the compromised file.
A further risk when using MD5 is in so-called Rainbow Tables. These create a kind of dictionary, in which known passwords and their hashes are listed. However, Rainbow Tables are only manageable for short passwords; For longer passwords, the lookup is so rake intensive that it can only cope with strong computers. Additional protection against rainbow tables and dictionary attacks offers the use of so-called salted hashes. In this method, a random addition is appended to the original message, and the MD5 hash is calculated therefrom. When storing salted hashes, not only the hash, but also the associated salt value, must be stored so that passwords are actually recovered.
The seotoolsearch.com MD5 Generator generates an MD5 checksum from any text or number sequence. This can be used, for example, to check the integrity of transmitted data or to communicate securely - if the file or the message has been manipulated or otherwise compromised, the checksum is inconsistent.