International Journal Of Engineering And Computer Science
In cryptography, MD5 known as Message Digest 5 was developed to overcome the cryptanalytic attacks on MD4 algorithm. Most of the hash functions are based on Merkle-Damgard construction, such as MD2, MD4, MD5, and SHA1 etc are often utilized with digital signature algorithm, keyed hash message authentication codes, key derivation functions and random number generators. MD5 takes as input any message of arbitrary length and produces as output a 128 bit message digest. Though MD5 came as a modification of MD4 to overcome its weaknesses but in 2004 some serious flaws were discovered and advances were made in breaking MD5.