--- a/MD5Stream.st Sun Mar 17 17:40:42 2019 +0100
+++ b/MD5Stream.st Sun Mar 17 17:41:36 2019 +0100
@@ -1,3 +1,5 @@
+"{ Encoding: utf8 }"
+
"
COPYRIGHT (c) 1999 by eXept Software AG
All Rights Reserved
@@ -54,14 +56,13 @@
documentation
"
Generate a MD5 hash value as defined in RFC 1321.
- This may be used as checksum or for generating cryptographic signatures.
Note:
in August 2004, some researchers have found a way to generate full collisions for MD5.
Therefore, for new applications, it may be wise to choose another hash function for security stuff.
See a hash-collision example in the examples method.
- So, the MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
+ The MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
the same hash (collision attack).
The use of this algorithm is only justified for non-cryptographic application.