Want this question answered?
The MD5 hash algorithm is a cryptographic hash function, not an encryption method. A cryptographic hash function converts a message of variable length to a fixed size of 'hash,' usually done to check the integrity and authenticity of the original message, and not transmit the message itself in a unreadable encrypted way. The message is also sent ALONG with the hash, usually to ensure that the original message has not been altered en route. Thus it does not have enough information to actually retrieve the message itself. (although it can if the size of the message is the size of the hash, it is never the case.) Decrypting the MD5 hash string will not yield the information that was used for its creation anyways.
hash function is technique used in message authentication it is attached to the message for security purpose
yes
To achieve data security and integrity.
When the message transferred from sender to receiver in not added, deleted or modifies by an external third parties, then that message represents the message integrity. Message confidentiality will be added when the message is not been viewed or noted by the unauthorized user. Message integrity and message confidentiality are related to each other. Without message confidentiality you cannot achieve message integrity and vice versa.
MD5 and SHA
Hash is not encryption, it is the way a word, or message is changed into a unrecognized pattern. ...........you might want to change the categories
You are probably referring to the MD5 Message-Digest Algorithm which is a widely used cryptographic hash function that produces 128-bit (16-byte) hash values. A hash function is an algorithm that takes a block of data and creates a string of data (hash) of fixed length. By running the algorithm on a received block of data, a user should be able to detect whether the data has been altered because a given block of data should always yield the same hash unless it has been altered. Ideally a hash function will allow easy computation of the hash value for any given message but make it hard to start with the hash value and come up with a message that will yield that hash value. It should also be so difficult to modify a message without changing the hash that the time and effort necessary to do it exceeds the value of doing it and extremely difficult or impractical to find two different messages with the same hash. Note that by its nature the MD5 hash is not supposed to allow you to recover the message that was processed. Usually when we use the word "encryption" we are talking about a process where a message is converted to something called "cyphertext" which is unreadable unless you have the right algorithm and key to decrypt it and convert it back to the original message. In this respect it is more accurate to refer to "MD5 hashing" rather than MD5 encryption. See the attached link for more details on the MD5 hash.
In cryptography, MD5 (Message-Digest algorithm 5) is a widely used, partially insecure cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed 32-character string of hexadecimal numbers.The MD5 hash also known as checksum for a file is a 128-bit value, something like a fingerprint of the file. There is a very small possibility of getting two identical hashes of two different files. This feature can be useful both for comparing the files and their integrity control. Let us imagine a situation that will help to understand how the MD5 hash works. Alice and Bob have two similar huge files. How do we know that they are different without sending them to each other? We simply have to calculate the MD5 hashes of these files and compare them.The MD5 hash is used in many websites.
Hashing is an algorithm (hash function) to convert a string of characters into a fixed sized text using mathematical functions. The file to be hashed is known as “input” the algorithm used in known as ”hash function” and output is called “Hash Value”, some people call hash value as message digest. Hash value is the value that dictates what exactly in this file and always produces hexadecimal value. more on :networkingmania
A hash cannot be "decrypted". It's a hash, meaning it's a validation of a file, to ensure the file's integrity. It's also constructed in a way, so it's virtually impossible to modify a file to match a specific hash value.
Each torrent has its own unique fingerprint called a "hash". The content in a torrent is broken down into pieces or "bits". Each bit comes with its own hash. While a torrent is downloading, each piece of the content is subjected to a "hash check", where the hash of the piece is compared to the hash of the torrent to verify its integrity. A "hash fail" is where the piece's hash fails to match the hash of the torrent. This usually is due to a corruption in transfer. The hash check is one of the best features of bittorrent as it ensures that the completed download will be uncorrupted and prevents anyone from injecting any malware into a clean torrent. A small amount of hash fails on a torrent is normal.