--- a/MD5Stream.st Thu Jan 12 13:57:07 2012 +0100
+++ b/MD5Stream.st Thu Jan 12 17:28:30 2012 +0100
@@ -59,6 +59,11 @@
Therefore, for new applications, it may be wise to choose another hash function for security stuff.
See a hash-collision example in the examples method.
+ So, the MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
+ the same hash (collision attack).
+ The use of this algorithm is only justified for non-cryptographic application.
+
+
performance: roughly
80000 Kb/s on a 2Ghz Duo
27200 Kb/s on a 1.2Ghz Athlon
@@ -384,11 +389,11 @@
!MD5Stream class methodsFor:'documentation'!
version
- ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.19 2012-01-10 22:48:34 cg Exp $'
+ ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.20 2012-01-12 16:28:30 cg Exp $'
!
version_CVS
- ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.19 2012-01-10 22:48:34 cg Exp $'
+ ^ '$Header: /cvs/stx/stx/libbasic/MD5Stream.st,v 1.20 2012-01-12 16:28:30 cg Exp $'
! !
MD5Stream initialize!