See also: Algorithms | Hash
MD5 verifies data integrity. MD5 has a hash length of 128-bits. Description and source code for the algorithm can be found in RFC 1321 [ (http://isc.faqs.org/rfcs/rfc1321.html)].
Since 1996, analytical breakthroughs have made MD5 suspect for certain uses, because it is easier to find certain kinds of collisions (http://www.tcs.hut.fi/~mjos/md5/) than originally thought. Although MD5 is more than adequate for most applications, a higher-security alternative is SHA-1.
- MD5CRK (http://www.md5crk.com) – Distributed computing project aiming to prove the above stated vulnerabilities in the MD5 algorithm.
- FastSum (http://www.fastsum.com) – Freeware utility for the files integrity control
TakeDown.NET -> “MD5”