See also: Algorithms | Hash

MD5 verifies data integrity. MD5 has a hash length of 128-bits. Description and source code for the algorithm can be found in RFC 1321 [[1] (].


Since 1996, analytical breakthroughs have made MD5 suspect for certain uses, because it is easier to find certain kinds of collisions ( than originally thought. Although MD5 is more than adequate for most applications, a higher-security alternative is SHA-1.



  • MD5sum
  • SHA-1
  • MD5CRK ( – Distributed computing project aiming to prove the above stated vulnerabilities in the MD5 algorithm.
  • FastSum ( – Freeware utility for the files integrity control

TakeDown.NET -> “MD5