473,398 Members | 2,088 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,398 software developers and data experts.

md5

Hi all,
Im quite comfortable with php but new to encryption, could someone please
highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what way is
md5 ( + the others sha...)used?
--
http://www.gregerhaga.net
Aug 18 '05 #1
4 1795
Greger wrote:
Im quite comfortable with php but new to encryption, could someone please
highlight when encryption would be a good thing.
When you have a secret to protect?
Also:is there a reverse of the md5 function? ( in other words in what way is
md5 ( + the others sha...)used?


Ehh... no. MD5 is a one-way hash (http://en.wikipedia.org/wiki/MD5).
You really ought to have a look at some literature, maybe start here:
http://www.sans.org/rr/

/Marcin
Aug 18 '05 #2
*** Greger wrote/escribió (Thu, 18 Aug 2005 14:21:42 +0200):
Im quite comfortable with php but new to encryption, could someone please
highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what way is
md5 ( + the others sha...)used?


MD5 is a hash that's normally displayed as a 32 character string. That
means that even the MD5 hash of a 2GB files is 32 byte long: if it was
reversable we would have found the most amazing compression algorithm ;-)

Encryption can be rather complicate. I suggest you first define your needs
and then find solutions for them.

Hashes have several usages:

* Test file integrity
* Password storage (you cannot decrypt passwords, yet you can encrypt the
value provided by user and compare)

--
-- Álvaro G. Vicario - Burgos, Spain
-- http://bits.demogracia.com - Mi sitio sobre programación web
-- Don't e-mail me your questions, post them to the group
--
Aug 18 '05 #3
zen
Why not use something like:
http://www.sourceguardian.com/
This will encrypt the php source

regards
nik
http://www.ads4links.com

"Alvaro G Vicario" <al******************@telecomputer.com> wrote in message
news:13******************************@40tude.net.. .
*** Greger wrote/escribió (Thu, 18 Aug 2005 14:21:42 +0200):
Im quite comfortable with php but new to encryption, could someone please highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what way is md5 ( + the others sha...)used?


MD5 is a hash that's normally displayed as a 32 character string. That
means that even the MD5 hash of a 2GB files is 32 byte long: if it was
reversable we would have found the most amazing compression algorithm ;-)

Encryption can be rather complicate. I suggest you first define your needs
and then find solutions for them.

Hashes have several usages:

* Test file integrity
* Password storage (you cannot decrypt passwords, yet you can encrypt the
value provided by user and compare)

--
-- Álvaro G. Vicario - Burgos, Spain
-- http://bits.demogracia.com - Mi sitio sobre programación web
-- Don't e-mail me your questions, post them to the group
--

Aug 18 '05 #4
No one is talking about ecrypting the php source here...

The question was: how does one ecrypt data... not their source files.
zen wrote:
Why not use something like:
http://www.sourceguardian.com/
This will encrypt the php source

regards
nik
http://www.ads4links.com

"Alvaro G Vicario" <al******************@telecomputer.com> wrote in message
news:13******************************@40tude.net.. .
*** Greger wrote/escribió (Thu, 18 Aug 2005 14:21:42 +0200):
Im quite comfortable with php but new to encryption, could someone
please
highlight when encryption would be a good thing.

Also:is there a reverse of the md5 function? ( in other words in what
way is
md5 ( + the others sha...)used?


MD5 is a hash that's normally displayed as a 32 character string. That
means that even the MD5 hash of a 2GB files is 32 byte long: if it was
reversable we would have found the most amazing compression algorithm ;-)

Encryption can be rather complicate. I suggest you first define your needs
and then find solutions for them.

Hashes have several usages:

* Test file integrity
* Password storage (you cannot decrypt passwords, yet you can encrypt the
value provided by user and compare)

--
-- Álvaro G. Vicario - Burgos, Spain
-- http://bits.demogracia.com - Mi sitio sobre programación web
-- Don't e-mail me your questions, post them to the group
--


Aug 18 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: William C. White | last post by:
Does anyone know of a way to use PHP /w Authorize.net AIM without using cURL? Our website is hosted on a shared drive and the webhost company doesn't installed additional software (such as cURL)...
2
by: Albert Ahtenberg | last post by:
Hello, I don't know if it is only me but I was sure that header("Location:url") redirects the browser instantly to URL, or at least stops the execution of the code. But appearantely it continues...
3
by: James | last post by:
Hi, I have a form with 2 fields. 'A' 'B' The user completes one of the fields and the form is submitted. On the results page I want to run a query, but this will change subject to which...
0
by: Ollivier Robert | last post by:
Hello, I'm trying to link PHP with Oracle 9.2.0/OCI8 with gcc 3.2.3 on a Solaris9 system. The link succeeds but everytime I try to run php, I get a SEGV from inside the libcnltsh.so library. ...
1
by: Richard Galli | last post by:
I want viewers to compare state laws on a single subject. Imagine a three-column table with a drop-down box on the top. A viewer selects a state from the list, and that state's text fills the...
4
by: Albert Ahtenberg | last post by:
Hello, I have two questions. 1. When the user presses the back button and returns to a form he filled the form is reseted. How do I leave there the values he inserted? 2. When the...
1
by: inderjit S Gabrie | last post by:
Hi all Here is the scenerio ...is it possibly to do this... i am getting valid course dates output on to a web which i have designed ....all is okay so far , look at the following web url ...
2
by: Jack | last post by:
Hi All, What is the PHP equivilent of Oracle bind variables in a SQL statement, e.g. select x from y where z=:parameter Which in asp/jsp would be followed by some statements to bind a value...
3
by: Sandwick | last post by:
I am trying to change the size of a drawing so they are all 3x3. the script below is what i was trying to use to cut it in half ... I get errors. I can display the normal picture but not the...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.