in reply to Using MD5 and the theory behind it
I deal with a good bit of datacomm and file transfers. I use MD5 to identify when I have received suspect duplicate files. I keep a DB table with the MD5 values of all the files that have been transmitted to me. Whenever I get a new file, I compare its MD5 valye to those stored in the table. If the value is not in the table, I process the file and store its MD5 value in the table. If the value is in the table I set the file asside for special handling and notify an operator.
If you really want to learn about exactly how the (and other hash algorighms) work I recomend checking out Applied Cryptography by Bruce Schneier.
|
---|
Replies are listed 'Best First'. | |
---|---|
Re: Re: Using MD5 and the theory behind it
by r.joseph (Hermit) on Jan 10, 2001 at 06:43 UTC | |
by arturo (Vicar) on Jan 10, 2001 at 06:56 UTC | |
by mwp (Hermit) on Jan 11, 2001 at 07:04 UTC |