Rivest, 1992. The algorithm takes as input a octet string of arbitrary length and generates a 128-bit hash value, "message digest" from the message contents.
While some message collisions (different messages with same MD5 digest) has been generated, using collisions in an actual attack is much harder and MD5 can be considered as cryptographically strong.
Files | |
file | su_md5.c |
MD5 Implementation. |