Tagged articles
3 articles
Page 1 of 1
Tencent Cloud Developer
Tencent Cloud Developer
Jan 19, 2022 · Information Security

Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable

This article explores the MD5 hashing algorithm in depth, detailing its fixed 128‑bit output, the padding and block processing steps defined in RFC 1321, the internal round functions, and the reasons it is considered irreversible yet vulnerable to collisions and various cracking techniques such as brute‑force, rainbow tables, and differential attacks.

MD5collision attackcryptography
0 likes · 15 min read
Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable
ITPUB
ITPUB
Aug 16, 2016 · Information Security

Real PGP Short‑ID Collisions Expose Fake Keys and MITM Risks – Use Full Fingerprints

Since June, genuine PGP short‑ID collision attacks have surfaced, allowing attackers to create fake keys that exactly copy the name, email, and trust signatures of real keys, enabling man‑in‑the‑middle exploits, and experts now urge displaying full fingerprints to eliminate the threat.

MITMPGPcollision attack
0 likes · 4 min read
Real PGP Short‑ID Collisions Expose Fake Keys and MITM Risks – Use Full Fingerprints
Baidu Tech Salon
Baidu Tech Salon
Sep 4, 2014 · Information Security

Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming

MD5 is a one‑way hash, not an encryption method, and its 128‑bit output cannot be mathematically reversed; understanding this requires solid algorithmic and mathematical foundations, which the author argues are essential for programmers alongside broader theoretical knowledge rather than relying on mere trial‑and‑error experience.

MD5collision attackcryptography
0 likes · 7 min read
Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming