{"id":1662,"date":"2015-03-11T09:25:50","date_gmt":"2015-03-11T13:25:50","guid":{"rendered":"http:\/\/www.eyoungwon.com\/journal\/?p=1662"},"modified":"2024-07-15T22:21:14","modified_gmt":"2024-07-16T02:21:14","slug":"nd5-hash","status":"publish","type":"post","link":"https:\/\/eyoungwon.com\/journal\/nd5-hash\/","title":{"rendered":"MD5 is a secure hash algorithm"},"content":{"rendered":"<p><strong>MD5<\/strong> is a secure hash algorithm. It takes a string as input, and produces a 128-bit number, the hash. The same string always produces the same hash, but given a hash, it is not generally possible to determine the original string. Secure hash algorithms are useful for protecting passwords and ensuring data integrity.<\/p>\n<p><a title=\"MD5 Hash\" href=\"http:\/\/pajhome.org.uk\/crypt\/md5\/\" target=\"_blank\" rel=\"noopener\">This site<\/a> has a JavaScript implementation of MD5, and some other secure hash algorithms. This allows web sites to perform simple cryptography on clients, enabling some useful applications:<\/p>\n<p><strong>Protecting Passwords<\/strong><br \/>\nWithout protection, passwords are vulnerable to network sniffing. An attacker could be monitoring an open wireless access point, or using a tool like tcpdump on an ethernet network. JavaScript MD5 provides basic protection of passwords, for sites that do not use SSL.<\/p>\n<p><strong>Generating Passwords<\/strong><br \/>\nMost people have accounts on many different web sites. It isn&#8217;t possible to remember so many passwords, so most people use the same password everywhere. If one web site suffers a security breach, or has a malicious operator, all your online accounts are at risk. Password generators help solve this problem.<\/p>\n<p><strong>Self-Decrypting Pages<\/strong><br \/>\nInternet email messages are vulnerable to interception and generally considered unsuitable for confidential communication. A self-decrypting page is unreadable until the correct password is entered. Pages can be attached to emails to support confidential communication.<\/p>\n<p>Check out <a title=\"Paj MD5 HASM JavaScript\" href=\"http:\/\/pajhome.org.uk\/crypt\/md5\/&#96;\" target=\"_blank\" rel=\"noopener\">Paj&#8217;s<\/a> Website for More<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MD5 is a secure hash algorithm. It takes a string as input, and produces a 128-bit number, the hash. The same string always produces the same hash, but given a hash, it is not generally possible to determine the original string. Secure hash algorithms are useful for protecting passwords and ensuring data integrity. This site [&hellip;]<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,2],"tags":[776,775,777],"class_list":["post-1662","post","type-post","status-publish","format-standard","hentry","category-mysql","category-web-development","tag-md5-hash","tag-md5-is-a-secure-hash-algorithm","tag-md5-passwords"],"_links":{"self":[{"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/posts\/1662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/comments?post=1662"}],"version-history":[{"count":2,"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/posts\/1662\/revisions"}],"predecessor-version":[{"id":1699,"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/posts\/1662\/revisions\/1699"}],"wp:attachment":[{"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/media?parent=1662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/categories?post=1662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eyoungwon.com\/journal\/wp-json\/wp\/v2\/tags?post=1662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}