際際滷

際際滷Share a Scribd company logo
Cryptographic Hash Function: MD5
1
1
Md. Shahidul Islam
CSE, KU
shahid.sm35@gmail.com
Outline
 Introduction
Features
Application
Algorithm
Hash analysis
Drawbacks
2
2
Introduction
 A cryptographic hash function is a kind of algorithm
that can be run on a piece of data, like an individual
file or a password, producing a value called a
checksum.
 MD5 (Message-Digest algorithm 5) is a widely used
cryptographic hash function designed by Ronald L.
Rivest in 1991.
 It is one in a series of message digest algorithms.
3
3
Features of a hash function
 Fixed Length Output (Hash Value)
 Efficiency in computing
 Collision Resistance, two different message should not have
the same hash value
 Deterministic so the same message always results in the same
hash
 Infeasible to generate a message from its hash value except
by trying all possible messages
4
4
Application
 There are two types of application of hash function:
1. Password Storage
2. Data Integrity Check
5
5
Application (Cont.)
 MD5 is used to store hash passwords and verify
when user login.
 An intruder can only see the hashes of passwords,
even if he accessed the password.
6
6
Application (Cont.)
7
7
Application (Cont.)
 The integrity check helps the user to detect any
changes made to original file.
8
8
Algorithm
9
9
Step 1: Append padded bits:
 The message is padded so that, length mod 512 = 448
 A single 1 bit is appended to the message, and then 0 bits are
appended so that the length in bits equals 448 modulo 512.
Message 1 0 0 0 0 0
(Message length + padded bits) % 512 = 448
Algorithm (Cont.)
10
10
Step 2: Append length:
 A 64 bit integer representation of message is appended to the result of
the previous step.
 The resulting message has a length that is an exact multiple of 512
bits.
Message 1 0 0 0 0 0 64bits
(Message length + padded bits + 64 bits ) % 512 = 0
Algorithm (Cont.)
11
Step 3: Initialize MD Buffer:
 A four-word buffer (A,B,C,D) is used to compute the message digest.
 These are initialized to the
following values in hexadecimal:
A: 01 23 45 67
B: 89 ab cd ef
C: fe dc ba 98
D: 76 54 32 10
Algorithm (Cont.)
12
Step 4: Process message in 16-word blocks:
 Four auxiliary functions that take as input three 32-bit
words and produce as output one 32-bit word.
F(X, Y, Z) = (X  Y)  (測 X  Z)
G(X, Y, Z) = (X  Z)  (Y  測 Z)
H(X, Y, Z) = X  Y  Z
I(X, Y, Z) = Y  (X  測Z)
Algorithm (Cont.)
13
Step 5: Output:
 The message digest produced as output is A, B, C, D.
 That is, output begins with the low-order byte of A,
and end with the high-order byte of D.
A1 A2 . . . . . . . . . . . . . . . . . . . . D3
128 bits = 32 hexadecimal digits
A1, A2 are bytes
Hash analysis
14
 A small change in original message and the output
digest is completely different
Hash analysis (Cont.)
15
 Arbitrary message length to fixed length digest
 For MD5 128 bits = 32bits hexadecimal
Drawbacks
 In 1993 a hash collision was found in MD5 compression
function.
 In 2009 a preimage attack against MD5 was published that
breaks MD5s preimage resistance.
 In 2012, the most infamous attack happened by the Flame
Malware. The CMU Software Engineering Institute considers
MD5 "cryptographically broken and unsuitable for further
use".
16
16
Drawbacks (Cont.)
 For cracking password crackers use rainbow table
 Salting process can make rainbow table ineffective
17
17
Thank You
18

More Related Content

What's hot (20)

Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
Hashing
HashingHashing
Hashing
Hossain Md Shakhawat
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
SHA 1 Algorithm
SHA 1 AlgorithmSHA 1 Algorithm
SHA 1 Algorithm
Shiva RamDam
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
Sunil Meena
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
Vittorio Giovara
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
SHA 1 Algorithm.ppt
SHA 1 Algorithm.pptSHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
Confidentiality using symmetric encryption.pptx
Confidentiality using symmetric encryption.pptxConfidentiality using symmetric encryption.pptx
Confidentiality using symmetric encryption.pptx
AYUSHJAIN152065
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
Sou Jana
Hash function
Hash function Hash function
Hash function
Salman Memon
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Adri Jovin
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
Prateek Singh Bapna
Hash Function
Hash Function Hash Function
Hash Function
ssuserdfb2da
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
SHA 1 Algorithm
SHA 1 AlgorithmSHA 1 Algorithm
SHA 1 Algorithm
Shiva RamDam
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
Sunil Meena
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
Vittorio Giovara
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
SHA 1 Algorithm.ppt
SHA 1 Algorithm.pptSHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
Confidentiality using symmetric encryption.pptx
Confidentiality using symmetric encryption.pptxConfidentiality using symmetric encryption.pptx
Confidentiality using symmetric encryption.pptx
AYUSHJAIN152065
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
Sou Jana
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Adri Jovin
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
Prateek Singh Bapna

Similar to Cryptographic hash function md5 (20)

Cryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptxCryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptx
VivekanandaGN1
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
ijsrd.com
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN 錚
A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
Khulna University, Khulna, Bangladesh
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithms
Hridyesh Bisht
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.pptENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
SakethBhargavaRallap
Cns
CnsCns
Cns
ArthyR3
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
IRJET Journal
introduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.pptintroduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.ppt
madlord2
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Fraboni Ec
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
Harry Potter
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Luis Goldster
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
James Wong
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Young Alista
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
David Hoen
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Tony Nguyen
Cryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptxCryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptx
VivekanandaGN1
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
ijsrd.com
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN 錚
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithms
Hridyesh Bisht
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.pptENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
SakethBhargavaRallap
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
IRJET Journal
introduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.pptintroduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.ppt
madlord2
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Fraboni Ec
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
Harry Potter
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Luis Goldster
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
James Wong
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Young Alista
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
David Hoen
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Tony Nguyen

Recently uploaded (20)

EDL 290F Week 3 - Mountaintop Views (2025).pdf
EDL 290F Week 3  - Mountaintop Views (2025).pdfEDL 290F Week 3  - Mountaintop Views (2025).pdf
EDL 290F Week 3 - Mountaintop Views (2025).pdf
Liz Walsh-Trevino
Computer Application in Business (commerce)
Computer Application in Business (commerce)Computer Application in Business (commerce)
Computer Application in Business (commerce)
Sudar Sudar
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptxFESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
DanmarieMuli1
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
Useful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷sUseful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷s
Celine George
Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025
Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025
Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025
Conquiztadors- the Quiz Society of Sri Venkateswara College
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
The Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom WalkerThe Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom Walker
History of Stoke Newington
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
Digital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptxDigital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptx
Dr. Sarita Anand
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
Association for Project Management
QuickBooks Desktop to QuickBooks Online How to Make the Move
QuickBooks Desktop to QuickBooks Online  How to Make the MoveQuickBooks Desktop to QuickBooks Online  How to Make the Move
QuickBooks Desktop to QuickBooks Online How to Make the Move
TechSoup
How to Manage Putaway Rule in Odoo 17 Inventory
How to Manage Putaway Rule in Odoo 17 InventoryHow to Manage Putaway Rule in Odoo 17 Inventory
How to Manage Putaway Rule in Odoo 17 Inventory
Celine George
Mate, a short story by Kate Grenville.pptx
Mate, a short story by Kate Grenville.pptxMate, a short story by Kate Grenville.pptx
Mate, a short story by Kate Grenville.pptx
Liny Jenifer
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet
EDL 290F Week 3 - Mountaintop Views (2025).pdf
EDL 290F Week 3  - Mountaintop Views (2025).pdfEDL 290F Week 3  - Mountaintop Views (2025).pdf
EDL 290F Week 3 - Mountaintop Views (2025).pdf
Liz Walsh-Trevino
Computer Application in Business (commerce)
Computer Application in Business (commerce)Computer Application in Business (commerce)
Computer Application in Business (commerce)
Sudar Sudar
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptxFESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
DanmarieMuli1
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
Useful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷sUseful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷s
Celine George
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
The Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom WalkerThe Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom Walker
History of Stoke Newington
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
Digital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptxDigital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptx
Dr. Sarita Anand
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
Association for Project Management
QuickBooks Desktop to QuickBooks Online How to Make the Move
QuickBooks Desktop to QuickBooks Online  How to Make the MoveQuickBooks Desktop to QuickBooks Online  How to Make the Move
QuickBooks Desktop to QuickBooks Online How to Make the Move
TechSoup
How to Manage Putaway Rule in Odoo 17 Inventory
How to Manage Putaway Rule in Odoo 17 InventoryHow to Manage Putaway Rule in Odoo 17 Inventory
How to Manage Putaway Rule in Odoo 17 Inventory
Celine George
Mate, a short story by Kate Grenville.pptx
Mate, a short story by Kate Grenville.pptxMate, a short story by Kate Grenville.pptx
Mate, a short story by Kate Grenville.pptx
Liny Jenifer
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet

Cryptographic hash function md5

  • 1. Cryptographic Hash Function: MD5 1 1 Md. Shahidul Islam CSE, KU shahid.sm35@gmail.com
  • 3. Introduction A cryptographic hash function is a kind of algorithm that can be run on a piece of data, like an individual file or a password, producing a value called a checksum. MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function designed by Ronald L. Rivest in 1991. It is one in a series of message digest algorithms. 3 3
  • 4. Features of a hash function Fixed Length Output (Hash Value) Efficiency in computing Collision Resistance, two different message should not have the same hash value Deterministic so the same message always results in the same hash Infeasible to generate a message from its hash value except by trying all possible messages 4 4
  • 5. Application There are two types of application of hash function: 1. Password Storage 2. Data Integrity Check 5 5
  • 6. Application (Cont.) MD5 is used to store hash passwords and verify when user login. An intruder can only see the hashes of passwords, even if he accessed the password. 6 6
  • 8. Application (Cont.) The integrity check helps the user to detect any changes made to original file. 8 8
  • 9. Algorithm 9 9 Step 1: Append padded bits: The message is padded so that, length mod 512 = 448 A single 1 bit is appended to the message, and then 0 bits are appended so that the length in bits equals 448 modulo 512. Message 1 0 0 0 0 0 (Message length + padded bits) % 512 = 448
  • 10. Algorithm (Cont.) 10 10 Step 2: Append length: A 64 bit integer representation of message is appended to the result of the previous step. The resulting message has a length that is an exact multiple of 512 bits. Message 1 0 0 0 0 0 64bits (Message length + padded bits + 64 bits ) % 512 = 0
  • 11. Algorithm (Cont.) 11 Step 3: Initialize MD Buffer: A four-word buffer (A,B,C,D) is used to compute the message digest. These are initialized to the following values in hexadecimal: A: 01 23 45 67 B: 89 ab cd ef C: fe dc ba 98 D: 76 54 32 10
  • 12. Algorithm (Cont.) 12 Step 4: Process message in 16-word blocks: Four auxiliary functions that take as input three 32-bit words and produce as output one 32-bit word. F(X, Y, Z) = (X Y) (測 X Z) G(X, Y, Z) = (X Z) (Y 測 Z) H(X, Y, Z) = X Y Z I(X, Y, Z) = Y (X 測Z)
  • 13. Algorithm (Cont.) 13 Step 5: Output: The message digest produced as output is A, B, C, D. That is, output begins with the low-order byte of A, and end with the high-order byte of D. A1 A2 . . . . . . . . . . . . . . . . . . . . D3 128 bits = 32 hexadecimal digits A1, A2 are bytes
  • 14. Hash analysis 14 A small change in original message and the output digest is completely different
  • 15. Hash analysis (Cont.) 15 Arbitrary message length to fixed length digest For MD5 128 bits = 32bits hexadecimal
  • 16. Drawbacks In 1993 a hash collision was found in MD5 compression function. In 2009 a preimage attack against MD5 was published that breaks MD5s preimage resistance. In 2012, the most infamous attack happened by the Flame Malware. The CMU Software Engineering Institute considers MD5 "cryptographically broken and unsuitable for further use". 16 16
  • 17. Drawbacks (Cont.) For cracking password crackers use rainbow table Salting process can make rainbow table ineffective 17 17

Editor's Notes

  • #4: A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors. - wikipedia
  • #8: Image source: Internet
  • #9: Image source: Internet
  • #17: A preimage attack on cryptographic hash functions tries to find a message that has a specific hash value.