Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • initialism Message Digest 5, a cryptographic hash function

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word MD5.

Examples

  • Though the passwords were encrypted, they were done so using a hashing algorithm called MD5, which is considered by many to be a flawed and outdated encryption method.

    CNET News.com 2011

  • The team of researchers has discovered that one of these algorithms, known as MD5, can be misused.

    Signs of the Times 2009

  • The new ArchiveVault features Message-Digest algorithm 5 (better known as MD5) message checking, which verifies message integrity to resist tampering, as well as multiple-user support, which lets more than one administrator securely access the archive.

    theWHIR.com - Daily Web Hosting News 2009

  • The team of researchers has discovered that one of these algorithms, known as MD5, can be misused.

    Republican National Convention Blog 2009

  • However, now that I'd fully bought in to the idea of MD5 on Silverlight, I was reluctant to let it go ...

    MSDN Blogs 2009

  • Steve: The right way to do it “randomly” would be to run the text through a strong hash function such as MD5, then use the value of the least significant bit to determine gender.

    Hitting the Target « Whatever 2007

  • For example, for "rolling hash", it found words related to pot, but for "rolling hash function", it came up with "MD5" and other one-way hash functions.

    More on Google behind the scenes Greg Linden 2004

  • For example, for "rolling hash", it found words related to pot, but for "rolling hash function", it came up with "MD5" and other one-way hash functions.

    Archive 2004-10-01 Greg Linden 2004

  • The only issue now when backing up Productstream Vault it says it could not backup that 30KB file (I assume due to some kind of MD5 checksum validating it's indeed the correct file) i'm not sure on how exactly this is validated.

    All Discussion Groups: Message List - root 2009

  • Hash Generations such as MD5, SHA1 are used to verify the integrity of the data.

    Madhur Kapoor's Blog 2008

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.