equal
deleted
inserted
replaced
56 |
56 |
57 Note: |
57 Note: |
58 in August 2004, some researchers have found a way to generate full collisions for MD5. |
58 in August 2004, some researchers have found a way to generate full collisions for MD5. |
59 Therefore, for new applications, it may be wise to choose another hash function for security stuff. |
59 Therefore, for new applications, it may be wise to choose another hash function for security stuff. |
60 See a hash-collision example in the examples method. |
60 See a hash-collision example in the examples method. |
|
61 |
|
62 So, the MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding |
|
63 the same hash (collision attack). |
|
64 The use of this algorithm is only justified for non-cryptographic application. |
|
65 |
61 |
66 |
62 performance: roughly |
67 performance: roughly |
63 80000 Kb/s on a 2Ghz Duo |
68 80000 Kb/s on a 2Ghz Duo |
64 27200 Kb/s on a 1.2Ghz Athlon |
69 27200 Kb/s on a 1.2Ghz Athlon |
65 12600 Kb/s on a 400Mhz PIII |
70 12600 Kb/s on a 400Mhz PIII |
382 ! ! |
387 ! ! |
383 |
388 |
384 !MD5Stream class methodsFor:'documentation'! |
389 !MD5Stream class methodsFor:'documentation'! |
385 |
390 |
386 version |
391 version |
387 ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.19 2012-01-10 22:48:34 cg Exp $' |
392 ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.20 2012-01-12 16:28:30 cg Exp $' |
388 ! |
393 ! |
389 |
394 |
390 version_CVS |
395 version_CVS |
391 ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.19 2012-01-10 22:48:34 cg Exp $' |
396 ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.20 2012-01-12 16:28:30 cg Exp $' |
392 ! ! |
397 ! ! |
393 |
398 |
394 MD5Stream initialize! |
399 MD5Stream initialize! |