Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

4
  • 2
    I wouldn't use MD5 for hashing - it's basically broken mscs.dal.ca/~selinger/md5collision Commented Jun 28, 2009 at 15:04
  • 3
    Actually, it's not that broken. What they can do is find the same hash value for two different files. What they can't do is reverse the MD5 and get a working password. Commented Jun 28, 2009 at 19:43
  • 2
    Well, wouldn't that be broken too then? You just enter the other password that generates the same hash, and you're in. You don't need to know the original password. The way to fix this is if you salt the password before hashing. Commented Feb 10, 2013 at 13:39
  • 3
    @mjuarez if you add a salt to the password befor you use MD5 the collision doesn't matter because you can't use the other password Commented Oct 11, 2013 at 13:38