In this post I will explain you about one of my favorite and interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5).This algorithm is mainly used to perform file integrity checks undermost circumstances. Here I will not jump into the technical aspects ofthis algorithm, rather will tell you about how to make use of thisalgorithm in your daily life. Before I tell you about how to use MD5, Iwould like to share one of my recent experience which made me startusing MD5 algorithm.
- Data loss during the download process, due to instability in the Internet connection/server
- The file can be tampered due to virus infections or
- Due to Hacker attacks
A MD5 hash is nothing but a 32 digit hexadicimal number which can be something as follows
A Sample MD5 Hash
e4d909c290d0fb1ca068ffaddf22cbd0
How to use MD5 Hash to check the Integrity of Files?
Suppose you have a file called backup.tar on yourserver. Before you download, you need to generate MD5 hash for thisfile on your server. To do so use the following command.
For UNIX:
md5sum backup.tar
When you hit ENTER you’ll see something as follows
e4d909c290d0fb1ca068ffaddf22cbd0
This is the MD5 hash for the file backup.tar. Afteryou download this file onto your PC, you can cross check it’s integrityby again re-generating MD5 hash for the downloaded file. If both thehash matches then it means that the file is perfect. Otherwise it meansthat the file is corrupt. To generate the MD5 hash for thedownloaded file on your Windows PC use the following freeware tool
DOWNLOAD IT
I hope you like this post. For further doubts and clarifications please pass your comments. Cheers!
SOURCE: My 1st Website