-
A typical application of MD5 is to generate a message-digest of a message to prevent tampering. For example, there are many software under UNIX that have the same file name and file extension when **. MD5 files, in which there is usually only one line of text, are roughly structured as follows:
md5 ( = 0ca175b9c0f726a831d895e269332461
This is the digital signature of the file. MD5 treats the entire file as a large text message, and through its irreversible string transformation algorithm, produces this unique md5 information digest. If there is any change in the content of the unspecified file in the process of disseminating the file in the future (including human modification or transmission errors caused by unstable lines in the process, etc.), as long as you recalculate the md5 of the file, you will find that the information summary is not the same, so you can be sure that you are only getting an incorrect file.
If there is a third-party certification body, using MD5 can also prevent the authorship of the document"Repudiation", which is known as a digital signature application.
MD5 is also widely used in encryption and decryption techniques. For example, in UNIX, the user's password is encrypted in MD5 (or other similar algorithms) and stored in the file system. When a user logs in, the system calculates the password entered by the user as the md5 value, and then compares it with the md5 value saved in the file system to determine whether the password entered is correct.
Through such steps, the system can determine the legitimacy of the user's login to the system without knowing the user's password. This not only prevents the user's password from being known by a user with system administrator privileges, but also increases the difficulty of password cracking to a certain extent.
It is for this reason that one of the most used methods by hackers to decipher passwords right now is one known as"Run the dictionary"method. There are two ways to obtain a dictionary, one is to collect a list of strings used as passwords on a daily basis, and the other is to use the permutation and combination method to generate the md5 values of these dictionary items with the md5 program, and then use the md5 value of the target to retrieve in this dictionary. Let's assume that the maximum length of the password is 8 bytes, and the password can only be letters and numbers, a total of 26 + 26 + 10 = 62 characters, and the number of entries in the permutated dictionary is p(62,1)+p(62,2)....
p (62,8), which is already a very astronomical number, and storing this dictionary requires terabytes of disk arrays, and this method also has a prerequisite, that is, if you can obtain the password md5 value of the target account. This encryption technology is widely used in UNIX systems, which is an important reason why UNIX systems are more robust than ordinary operating systems.
-
Your question makes people wonder, encrypt the field or what?
MD5 is a document signature, which is equivalent to our ID card. >>>More
A typical application of MD5 is to generate a message-digest of a message to prevent tampering. For example, there are many software under UNIX that have the same file name and file extension when **. MD5 files, in which there is usually only one line of text, are roughly structured as follows: >>>More
MD5 is often used on forums and software releases, in order to ensure the correctness of the file, to prevent some people from stealing the program, adding some Trojans or tampering with the copyright, a set of verification system designed. Each file can be calculated with a fixed MD5 code using the MD5 validator. Software authors often calculate the MD5 code of their programs in advance and post them on the Internet. >>>More
Let me answer :
MD5 encryption itself has nothing to do with the database, and the encryption is encrypted in asp** itself. >>>More
Give the unique data of the software and test whether the software has been changed. >>>More