Please explain to me what MD5 hash is, with regards to secure streaming. MD5 is a hashing algorithm. The hash value...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
resulting from MD5 can be encrypted to create a digital signature, but MD5 doesn't actually create digital signatures. It creates a hash value.
MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specific individual. MD5, which was developed by Professor Ronald L. Rivest of MIT, is intended for use with digital signature applications, which require that large files must be compressed by a secure method before being encrypted with a secret key, under a public key cryptosystem. MD5 is currently a standard, Internet Engineering Task Force (IETF) Request for Comments (RFC) 1321. According to the standard, it is "computationally infeasible" that any two messages that have been input to the MD5 algorithm could have as the output the same message digest, or that a false message could be created through apprehension of the message digest. MD5 is the third message digest algorithm created by Rivest. All three (the others are MD2 and MD4) have similar structures, but MD2 was optimized for 8-bit machines, in comparison with the two later formulas, which are optimized for 32-bit machines. The MD5 algorithm is an extension of MD4, which the critical review found to be fast, but possibly not absolutely secure. In comparison, MD5 is not quite as fast as the MD4 algorithm, but offers much more assurance of data security.
Dig Deeper on Network Administration
Related Q&A from Amy Kucharik
Learn what network latency is in this expert response.continue reading
Learn what the true definition of a download is and whether going from one Web site to another falls under this category in this Q&A with Amy ...continue reading
Learn about Multiprotocol Label Switching in this Q&A with Amy Kucharik.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.