MD5Stream.st
changeset 23938 16758cdac0c1
parent 21153 f573eac03390
child 23955 65bb2eee0144
--- a/MD5Stream.st	Sun Mar 17 17:40:42 2019 +0100
+++ b/MD5Stream.st	Sun Mar 17 17:41:36 2019 +0100
@@ -1,3 +1,5 @@
+"{ Encoding: utf8 }"
+
 "
  COPYRIGHT (c) 1999 by eXept Software AG
 	      All Rights Reserved
@@ -54,14 +56,13 @@
 documentation
 "
     Generate a MD5 hash value as defined in RFC 1321.
-    This may be used as checksum or for generating cryptographic signatures.
 
     Note:
         in August 2004, some researchers have found a way to generate full collisions for MD5.
         Therefore, for new applications, it may be wise to choose another hash function for security stuff.
         See a hash-collision example in the examples method.
 
-        So, the MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
+        The MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
         the same hash (collision attack).
         The use of this algorithm is only justified for non-cryptographic application.