MD5: Difference between revisions

Content deleted Content added
m Add alert
Tweak and add links about MD5.
Line 2: Line 2:
Encode a string using an MD5 algorithm. The algorithm can be found on [[wp:Md5#Algorithm|wikipedia]].
Encode a string using an MD5 algorithm. The algorithm can be found on [[wp:Md5#Algorithm|wikipedia]].


Optionally, validate your implementation by running all of the test values in [http://www.ietf.org/rfc/rfc1321.txt IETF RFC (1321) for MD5]. Additional the RFC provides more precise information on the algorithm than the Wikipedia article.
Optionally, validate your implementation by running all of the test values in [http://tools.ietf.org/html/rfc1321 IETF RFC (1321) for MD5]. Additional the RFC provides more precise information on the algorithm than the Wikipedia article.


{{alertbox|lightgray|'''Warning:''' MD5 has <!-- link needed -->known weaknesses. Users may consider a stronger alternative when doing production-grade cryptography, such as SHA-256 (from the SHA-2 family) or the upcoming SHA-3.}}
{{alertbox|lightgray|'''Warning:''' MD5 has [http://tools.ietf.org/html/rfc6151 known weaknesses], including '''collisions''' and [http://www.win.tue.nl/hashclash/rogue-ca/ forged signatures]. Users may consider a stronger alternative when doing production-grade cryptography, such as SHA-256 (from the SHA-2 family) or the upcoming SHA-3.}}


If the solution on this page is a library solution, see [[MD5/Implementation]] for an implementation from scratch.
If the solution on this page is a library solution, see [[MD5/Implementation]] for an implementation from scratch.