Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • initialism Message Digest 5, a cryptographic hash function

Etymologies

Sorry, no etymologies found.

Examples

  • Though the passwords were encrypted, they were done so using a hashing algorithm called MD5, which is considered by many to be a flawed and outdated encryption method.

    CNET News.com

  • The team of researchers has discovered that one of these algorithms, known as MD5, can be misused.

    Signs of the Times

  • The new ArchiveVault features Message-Digest algorithm 5 (better known as MD5) message checking, which verifies message integrity to resist tampering, as well as multiple-user support, which lets more than one administrator securely access the archive.

    theWHIR.com - Daily Web Hosting News

  • The team of researchers has discovered that one of these algorithms, known as MD5, can be misused.

    Republican National Convention Blog

  • However, now that I'd fully bought in to the idea of MD5 on Silverlight, I was reluctant to let it go ...

    MSDN Blogs

  • Steve: The right way to do it “randomly” would be to run the text through a strong hash function such as MD5, then use the value of the least significant bit to determine gender.

    Hitting the Target « Whatever

  • For example, for "rolling hash", it found words related to pot, but for "rolling hash function", it came up with "MD5" and other one-way hash functions.

    More on Google behind the scenes

  • For example, for "rolling hash", it found words related to pot, but for "rolling hash function", it came up with "MD5" and other one-way hash functions.

    Archive 2004-10-01

  • The only issue now when backing up Productstream Vault it says it could not backup that 30KB file (I assume due to some kind of MD5 checksum validating it's indeed the correct file) i'm not sure on how exactly this is validated.

    All Discussion Groups: Message List - root

  • Hash Generations such as MD5, SHA1 are used to verify the integrity of the data.

    Madhur Kapoor's Blog

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.