What is md5 hash?
The hash md5 function is a procedure that takes an input and changes it into a fixed-size string, which is commonly called a digest, which is unique for every input. Hashing used data comparing is done to check data integrity, password security, and unauthorized changes.
How md5 hash Hashing Algorithm Performed?
Now we will understand how hashing is performed. We have a file that can be in any format. Now that file is passed through a hashing algorithm. This hashing algorithm can be any, like MD5, SHA1, SHA256.
As soon as that file is given input in the hashing algorithm, then we get a hash value in the output, which is also called digest. This is a value that can be read, but it cannot be understood.
This hash value is irreversible. It cannot be brought in at its original value. As we know the encrypted value can be decrypted, but this is not possible in hashing. We can never decrypt the original file or can’t find out the original value.
Let’s understand the file or value.
Now we will discuss some qualities of the hashing function. First is fixed size hash value, plain text, or input file. Whether it is in MB or GB, its digest or hash value is always of a fixed size.
If we are using the MD5 algorithm and in input we use the A alphabet, then its MD5 hash value will be 128-bit. If we input the entire sentence, then the hash value will also be 128-bit.
Second, the hash function output will always be a unique value. If we change even one dot in the input, then the hash value changes completely. That is why the use of hashing is done to check the integrity of the data.
Third, we can never guess the input of the hash value. Original data.
What was it?
The hash value is irreversible. The use of hashing is also used to store passwords in the database. Let’s suppose you are making a Facebook ID. Here you will give your email.
You will set a password. This password will not be saved in plain text form in the database. The hash value of this password will be generated. And then that hash value will be saved in the database.
Now next time when you log in, then the password you typed The hash value of the password is calculated and then this hash value is matched with the saved hash value in the database.
When the hash value is matched, your login is successful. In this way, hashing is used in the storage of passwords. Even if the database of the website is hacked, the hacker will not be able to know your password.