473,811 Members | 2,859 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

md5

Hi all,
Im quite comfortable with php but new to encryption, could someone please
highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what way is
md5 ( + the others sha...)used?
--
http://www.gregerhaga.net
Aug 18 '05 #1
4 1807
Greger wrote:
Im quite comfortable with php but new to encryption, could someone please
highlight when encryption would be a good thing.
When you have a secret to protect?
Also:is there a reverse of the md5 function? ( in other words in what way is
md5 ( + the others sha...)used?


Ehh... no. MD5 is a one-way hash (http://en.wikipedia.org/wiki/MD5).
You really ought to have a look at some literature, maybe start here:
http://www.sans.org/rr/

/Marcin
Aug 18 '05 #2
*** Greger wrote/escribió (Thu, 18 Aug 2005 14:21:42 +0200):
Im quite comfortable with php but new to encryption, could someone please
highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what way is
md5 ( + the others sha...)used?


MD5 is a hash that's normally displayed as a 32 character string. That
means that even the MD5 hash of a 2GB files is 32 byte long: if it was
reversable we would have found the most amazing compression algorithm ;-)

Encryption can be rather complicate. I suggest you first define your needs
and then find solutions for them.

Hashes have several usages:

* Test file integrity
* Password storage (you cannot decrypt passwords, yet you can encrypt the
value provided by user and compare)

--
-- Álvaro G. Vicario - Burgos, Spain
-- http://bits.demogracia.com - Mi sitio sobre programación web
-- Don't e-mail me your questions, post them to the group
--
Aug 18 '05 #3
zen
Why not use something like:
http://www.sourceguardian.com/
This will encrypt the php source

regards
nik
http://www.ads4links.com

"Alvaro G Vicario" <al************ ******@telecomp uter.com> wrote in message
news:13******** *************** *******@40tude. net...
*** Greger wrote/escribió (Thu, 18 Aug 2005 14:21:42 +0200):
Im quite comfortable with php but new to encryption, could someone please highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what way is md5 ( + the others sha...)used?


MD5 is a hash that's normally displayed as a 32 character string. That
means that even the MD5 hash of a 2GB files is 32 byte long: if it was
reversable we would have found the most amazing compression algorithm ;-)

Encryption can be rather complicate. I suggest you first define your needs
and then find solutions for them.

Hashes have several usages:

* Test file integrity
* Password storage (you cannot decrypt passwords, yet you can encrypt the
value provided by user and compare)

--
-- Álvaro G. Vicario - Burgos, Spain
-- http://bits.demogracia.com - Mi sitio sobre programación web
-- Don't e-mail me your questions, post them to the group
--

Aug 18 '05 #4
No one is talking about ecrypting the php source here...

The question was: how does one ecrypt data... not their source files.
zen wrote:
Why not use something like:
http://www.sourceguardian.com/
This will encrypt the php source

regards
nik
http://www.ads4links.com

"Alvaro G Vicario" <al************ ******@telecomp uter.com> wrote in message
news:13******** *************** *******@40tude. net...
*** Greger wrote/escribió (Thu, 18 Aug 2005 14:21:42 +0200):
Im quite comfortable with php but new to encryption, could someone
please
highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what
way is
md5 ( + the others sha...)used?


MD5 is a hash that's normally displayed as a 32 character string. That
means that even the MD5 hash of a 2GB files is 32 byte long: if it was
reversable we would have found the most amazing compression algorithm ;-)

Encryption can be rather complicate. I suggest you first define your needs
and then find solutions for them.

Hashes have several usages:

* Test file integrity
* Password storage (you cannot decrypt passwords, yet you can encrypt the
value provided by user and compare)

--
-- Álvaro G. Vicario - Burgos, Spain
-- http://bits.demogracia.com - Mi sitio sobre programación web
-- Don't e-mail me your questions, post them to the group
--


Aug 18 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
11256
by: William C. White | last post by:
Does anyone know of a way to use PHP /w Authorize.net AIM without using cURL? Our website is hosted on a shared drive and the webhost company doesn't installed additional software (such as cURL) on the server because of that. Our site will have an SSL certificate next week, so I would like to use AIM instead of SIM, however, I don't know how to send data via POST over https and recieve data from the Authorize.net server over an https...
2
5849
by: Albert Ahtenberg | last post by:
Hello, I don't know if it is only me but I was sure that header("Location:url") redirects the browser instantly to URL, or at least stops the execution of the code. But appearantely it continues to execute the code until the browser send his reply to the header instruction. So an exit(); after each redirection won't hurt at all
3
23045
by: James | last post by:
Hi, I have a form with 2 fields. 'A' 'B' The user completes one of the fields and the form is submitted. On the results page I want to run a query, but this will change subject to which field is completed.
0
8502
by: Ollivier Robert | last post by:
Hello, I'm trying to link PHP with Oracle 9.2.0/OCI8 with gcc 3.2.3 on a Solaris9 system. The link succeeds but everytime I try to run php, I get a SEGV from inside the libcnltsh.so library. 354 roberto@ausone:Build/php-4.3.2> ldd /opt/php4/bin/php libsablot.so.0 => /usr/local/lib/libsablot.so.0 libstdc++.so.5 => /usr/local/lib/libstdc++.so.5 libm.so.1 => /usr/lib/libm.so.1
1
8615
by: Richard Galli | last post by:
I want viewers to compare state laws on a single subject. Imagine a three-column table with a drop-down box on the top. A viewer selects a state from the list, and that state's text fills the column below. The viewer can select states from the drop down lists above the other two columns as well. If the viewer selects only one, only one column fills. If the viewer selects two states, two columns fill. Etc. I could, if appropriate, have...
4
18312
by: Albert Ahtenberg | last post by:
Hello, I have two questions. 1. When the user presses the back button and returns to a form he filled the form is reseted. How do I leave there the values he inserted? 2. When the user comes back to a page where he had a submitted POST data the browser keeps telling that the data has expired and asks if repost. How to avoid that? I tried registering all POST and GET vars as SESSION vars but
1
6877
by: inderjit S Gabrie | last post by:
Hi all Here is the scenerio ...is it possibly to do this... i am getting valid course dates output on to a web which i have designed ....all is okay so far , look at the following web url http://www.mis.gla.ac.uk/biquery/training/ but each of the courses held have maximum of 8 people that could be
2
31451
by: Jack | last post by:
Hi All, What is the PHP equivilent of Oracle bind variables in a SQL statement, e.g. select x from y where z=:parameter Which in asp/jsp would be followed by some statements to bind a value to :parameter I dont like the idea of making the SQL statement on the fly without binding parameters as I dont want a highly polluted SQL cache.
3
23607
by: Sandwick | last post by:
I am trying to change the size of a drawing so they are all 3x3. the script below is what i was trying to use to cut it in half ... I get errors. I can display the normal picture but not the results of the picture half the size. The PHP I have installed support 1.62 or higher. And all I would like to do is take and image and make it fit a 3x3. Any suggestions to where I should read or look would be appreciated.
0
9722
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10379
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10393
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10124
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7664
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6882
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5550
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4334
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
3015
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.