SBTI Personality Test: A 15-Dimension Character Analysis Beyond MBTI
12 min
MD5 (Message-Digest Algorithm 5) is a widely used cryptographic hash function producing a 128-bit (32 hex character) hash. This article explains how MD5 works, its common uses, and its security limitations.
MD5 (Message-Digest Algorithm 5) was designed by Ronald Rivest at MIT in 1991. It accepts any-length input and outputs a fixed 128-bit (16-byte / 32 hex character) hash — often called a "message digest" or "digital fingerprint".
admin always hashes to 21232f297a57a5a743894a0e4a801fc3.
2. Avalanche Effect: A tiny change in input causes a dramatically different output.
3. One-way: Computationally infeasible to reverse a hash to the original input.
4. Fixed length: Always 32 hex characters, regardless of input size.
1. Padding: Pad the message to length ≡ 448 (mod 512)
2. Append length: Add a 64-bit representation of the original message length
3. Initialise buffer: Four 32-bit registers (A, B, C, D)
4. Process blocks: 512-bit blocks, 4 rounds × 16 steps = 64 steps total
5. Output: Final 128-bit hash
The safest modern use. Publishers post MD5 checksums; users verify their download:
``bash
# Linux
md5sum ubuntu-22.04.iso
# macOS
md5 ubuntu-22.04.iso
``
Early sites stored MD5 hashes instead of plaintext passwords.
Use BCrypt, Argon2, or PBKDF2 — purpose-built password hashing with salting and adjustable cost.
Quickly determine whether two data sets are identical — useful for file deduplication and cache validation.
Need a quick hash? Our Online MD5 Tool generates 32-bit and 16-bit MD5, supports uppercase, and runs entirely in your browser.
woshiit 技术团队
woshiit AI Navigation · Original Content
12 min
8 min
7 min
6 min