Beruflich Dokumente
Kultur Dokumente
By Alex Buzak
Overview
Purpose of MD5 and Hash Encryptions Examples MD5 Algorithm Explanation of Possible Security Risks Practical Applications Through Code Possible Future Security Risks
Difficulty In Cracking
Md5, with its 128bit encryption algorithm has 1,280,000,000,000,000,000 possible combinations.
Even if the exact same hash value found, possible other string combination could have created it.
It is considered that the md5 message digest would take an unrealistic time to crack via brute force attack.
Although it is likely that there are more than the two types of cracking techniques that I have been able to find, I shall only discuss the two most widely known.
Possible Techniques
Brute Force (easiest, but success low)
A brute force attack simply tries all possible combinations, until it finds the correct solution.
Digital Signatures (Authentication) Certificates One-Way Encryption Secure storage of information that does not need to be deciphered.
Digital Signatures
Possibly the best reason for having an md5 algorithm is for the use of digital signatures. They allow other people to digitally verify that whatever document they received is actually authentic and not tampered with. Couldnt find any free software to create digital signatures, or source code to hardcode it into any language. Therefore I cant show any examples of digital signatures or certificates in use.
Therefore, if someone were to be able to create another document with completely different content, but producing the same hash signature, it would still be said to be authentic.
Pros/Cons MD5
Easy to use Widely used Considered secure Difficult to crack Is susceptible to brute force attacks Hash collisions is a known flaw Quantum computers would make such an algorithm worthless