Find a working MD5 algorithm. Requires a main function. Thank you!

Updated on technology 2024-03-31
3 answers
  1. Anonymous users2024-02-07

    The characteristics of the MD5 algorithm are as follows:1. The length is fixed. Regardless of how many bytes of information are inputted, the output bytes are always 16 bytes.

    2. The result is irreversible. The original data cannot be deduced from the results, because no matter how many bytes of information is inserted into the input, the output is always 16 bytes.

    3. High degree of discreteness.

    The 16 bytes of the output are closed, and there is no pattern to speak of. If the two inputs change by only one bit, the output will be completely different.

    4.It is very difficult to achieve the same MD5 with two different data.

  2. Anonymous users2024-02-06

    MD5 stands for Message-Digest Algorithm 5, which was invented in the early 90's by MIT's Computer Science Lab and RSA Data Security Inc, and developed from MD2, MD3 and MD4.

    message-digest generally refers to the hash transformation of a byte string (message), that is, the transformation of a byte string of any length into a large integer of a certain length. Note that I used the word "byte string" instead of "string" because this transformation is only about the value of the byte, not about the character set or how it is encoded.

    MD5 converts arbitrary length of "string of bytes" into a large integer of 128 bits, and it is an irreversible string conversion algorithm, in other words, even if you see the source program and the description of the algorithm, you can't convert a value of MD5 back to the original string, mathematically speaking, because there are infinitely many original strings, which is a bit like a mathematical function with no inverse function.

    A typical application of MD5 is to generate a fingerprint on a message to prevent it from being "tampered with". For example, if you write a paragraph in a file called and generate an md5 value for this and record it, then you can spread the file to someone else, and if someone changes anything in the file, you will find out when you recalculate the md5 of the file (the two md5 values are not the same). If there is a third-party certification authority, MD5 can also prevent "repudiation" by the author of the document, which is called a digital signature application.

    MD5 is also widely used in encryption and decryption technology, in many operating systems, the user's password is saved in the form of MD5 value (or similar other algorithms), when the user login, the system calculates the password entered by the user as the MD5 value, and then compares it with the MD5 value saved in the system, and the system does not "know" what the user's password is.

  3. Anonymous users2024-02-05

    Message Digest Algorithm MD5 (Chinese name Message Digest Algorithm 5th Edition) is a hash function widely used in the field of computer security to provide integrity protection of messages.

Related questions
1 answers2024-03-31

Summary. After the publication of Einstein's "Theory of Relativity," someone concocted a book entitled "A Hundred People Refute the Theory of Relativity," which recruited a group of so-called celebrities to make a huge attack on this theory. >>>More

3 answers2024-03-31

As follows:

1, Xiaoran - taken from the poem: Xiaoxiao twilight rain Zigui cry. >>>More

11 answers2024-03-31

You should look at the secret of a gentleman, usually speak and act in an atmospheric and mostly way, so that you can be more masculine. Read more literary masterpieces and don't read those bubble literature. A lot of boys love anime, but they also like masculine sports like basketball and football. >>>More

17 answers2024-03-31

It's up to you, if you feel the need to make up for it, it's harmless to make up for it, right, hehe, if it's your own review at home, I can give you a little bit of my experience, first make a review plan, this is very important, the plan should be set according to your own situation, for example, where you don't master it well, the review plan will arrange more time for these unmastered knowledge, or you can search Xiaopeng online to learn Sina blog, which has guidance on arranging review, I used to read it a lot when I was in high school last year. The second point is that for the bad knowledge you have mastered, find more questions to practice, so as to consolidate them, isn't the exam exam just a test question, the question type is too much to do, and the exam is a piece of cake, hehe. The third point is to prepare a mistake book, write down the questions that you often get wrong on it, read more, and if you have made mistakes before, you can read it together, so that you will not make such mistakes in the future.

8 answers2024-03-31

Once upon a time, I heard some seniors say that the first year of high school is the most active year in their reading career, and they can go crazy and be very happy. >>>More