MD5 icon

MD5

2 big stars
MD5 screenshot
Name: MD5
Works on: windowsWindows XP and above
Developer: John Walker
Version: 1
Last Updated: 23 Feb 2017
Release: 06 Dec 2008
Category: Programming > Other Programming Files
Rate this software:
314 downloads
commentsComments
downloadDownload
Liked it? Tell others:
details

MD5 Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows XP | Windows 2000 | Windows 2003 | Windows 2008 | Windows Vista | Windows 2012
SHA1 Hash: 2218f4e4b6cc26c07cc7d1577dda5139fde976c6
Size: 73.9 KB
File Format: zip
Rating: 2 out of 5 based on 23 user ratings
Downloads: 314
License: Free
MD5 is a free software by John Walker and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2008, Windows Vista, Windows 2012.
You can download MD5 which is 73.9 KB in size and belongs to the software category Other Programming Files.
MD5 was released on 2008-12-06 and last updated on our database on 2017-02-23 and is currently at version 1.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

MD5 Description

The MD5 application was designed to be a command line utility usable on either Unix or MS-DOS / Windows, which generates and verifies message digests (digital signatures) using the MD5 algorithm. This program can be useful when developing shell scripts or Perl programs for software installation, file comparison, and detection of file corruption and tampering.
A message digest is a compact digital signature for an arbitrarily long stream of binary data. An ideal message digest algorithm would never generate the same signature for two different sets of input, but achieving such theoretical perfection would require a message digest as long as the input file.
Practical message digest algorithms compromise in favour of a digital signature of modest size created with an algorithm designed to make preparation of input text with a given signature computationally infeasible. Message digest algorithms have much in common with techniques used in encryption, but to a different end; verification that data have not been altered since the signature was published.
Many older programs requiring digital signatures employed 16 or 32 bit cyclical redundancy codes (CRC) originally developed to verify correct transmission in data communication protocols, but these short codes, while adequate to detect the kind of transmission errors for which they were intended, are insufficiently secure for applications such as electronic commerce and verification of security related software distributions.
The most commonly used present-day message digest algorithm is the 128 bit MD5 algorithm, developed by Ron Rivest of the MIT Laboratory for Computer Science and RSA Data Security, Inc. The algorithm, with a reference implementation, was published as Internet RFC 1321 in April 1992, and was placed into the public domain at that time.
Message digest algorithms such as MD5 are not deemed “encryption technology” and are not subject to the export controls some governments impose on other data security products. (Obviously, the responsibility for obeying the laws in the jurisdiction in which you reside is entirely your own, but many common Web and Mail utilities use MD5, and I am unaware of any restrictions on their distribution and use.)
The MD5 algorithm has been implemented in numerous computer languages including C, Perl, and Java; if youre writing a program in such a language, track down a suitable subroutine and incorporate it into your program. The program described on this page is a command line implementation of MD5, intended for use in shell scripts and Perl programs (it is much faster than computing an MD5 signature directly in Perl).
This md5 program was originally developed as part of a suite of tools intended to monitor large collections of files (for example, the contents of a Web site) to detect corruption of files and inadvertent (or perhaps malicious) changes. That task is now best accomplished with more comprehensive packages such as Tripwire, but the command line md5 component continues to prove useful for verifying correct delivery and installation of software packages, comparing the contents of two different systems, and checking for changes in specific files.
OPTIONS
- csignature
Computes the signature of the specified infile or the string supplied by the -d option and compares it against the specified signature. If the two signatures match, the exit status will be zero, otherwise the exit status will be 1. No signature is written; only the exit status is set. The signature to be checked must be specified as 32 hexadecimal digits.
- dinput_text
A signature is computed for the given input_text (which must be quoted if it contains white space characters) instead of input from infile or standard input. If input is specified with the -d option, no infile should be specified.
- l
Use lower case letters for hexadecimal digits “a” through “f”. By default, upper case letters are used. Note that the signature argument to the -c option may use upper or lower case hexadecimal digits (or a mix) regardless of the setting of this option.
- n
Suppress printing the file name (or “-” for standard input) after the hexadecimal signature.
- ofname
Write output to fname. If fname is “-”, output is written to standard output, which is the default is no -o option is specified.
- u
Print how-to-call information.
- v
Print version information.
similarSimilar Software