In this post I will explain about an interesting cryptographic algorithm
called MDS (message-digest algorithm 5). This algorithm is mainly used to
perform file integrity checks under most circumstances. Here I will not jump
into the technical aspects of this algorithm, rather will tell you about how to
use of this algorithm in your daily life. Before I tell you about how to use
MD5, I would like to share one of my recent experiences which made me start
using MD file algorithm. Recently I made significant change and updates to my
website and has obvious I generated a complete backup of the site on my server.
I downloaded this backup on to my PC and deleted the original one on the
server. But after a few days something went wrong and I wanted to restore the
backup that I downloaded. When I tried to restore the backup I was shocked! The
backup file that I used to restore was corrupted. That means, the backup file
that I downloaded on to my PC wasn’t exactly the one that was on my server. The
reason is that there occurred some data loss during download process. Yes, this
data loss can happen often when a file is downloaded from the internet. The
file can be corrupted due to any of the following reasons.
Ø
Data loss during the download process, due to
instability in the internet connection /server
Ø
The file can be tampered due to virus infection
or,
Ø
Due to hacker attacks
So whenever you download any valuable data from the internet
it is completely necessary that you check the integrity of the downloaded file.
That is need to ensure that the downloaded file is exactly the same as that of
the original one. In this scenario the MD5 hash can become handy. All you have
to do is generate MD5 hash (or MD5 check-sum) for the intended file on your
server. After you download the file on to your PC, again generate MD5 hash for
the downloaded file compare this to hashes and if it matches then it means that
the file is downloaded perfectly without any data loss.
A MD5 hash is nothing but a 32 digits hexadecimal number which
can be something has follows
A simple MD5 Hash
e4d909c290d0fb1ca068ffaddf22cbd0
this hash is unique for every file irrespective of its size
and type. That means two.exe files with the same size will not have the same
MD5 hash even though they are of same type and size. So MD5 hash can be used uniquely
identified a file.
How to use MD5 Hash
to check the Integrity of Files?
Suppose you have a file called backup. Tar on your server. Before
you download, you need to generate MD5 hash for this file on server. To do so
use the following command.
For UNIX
md5sumbackup.tar
When you hit ENTER you’ll see something has follows
e4d909c290d0fb1ca068ffaddf22cbd0
This is the MD5 hash for the file backup.tar. After you
download this file onto your PC, you can cross check it’s integrity by gain
re-generating MD5 hash for the downloaded file. If both the hash matches then
it means that the file is perfect. Otherwise it means that the file is corrupted.
To generate the MD5 hash for the downloaded file on your windows PC use the
following freeware tool.
“you can Download MD5
Summer Form Here: http://www.md5summer.org/downloadhtml”

I am aware of its simple meaning and purpose but today with the help of this article I have gained such an important detail about it. You have described each point in a very simple and easy way.
ReplyDeleteelectronic signature software