A hash algorithm, for computer scientists, is a way of turning one long string (some words, a number etc) into a shorter “hash code“. Hashing is used in multiple ways – for instance to check that a file you have downloaded matches the one on the server (you hash the downloaded file data and check… Read More Making a hash of universal credit
The main use of MD5 – at least if my computer is any guide – is to check that a file you have downloaded from the internet or elsewhere is what it says it is. In fact in this general use MD5 is not being used to encrypt anything – instead it produces a “message… Read More A further thought on MD5
My last posting – made in a hurry while I was waiting for a large SCP transfer to complete – has generated more traffic than anything else in the last month: possibly because it was mildly topical and largely because it was retweeted by John Rentoul, one of the UK’s leading political commentators and all-round… Read More So, is the MD5 weakness a real world problem or not?