473,395 Members | 2,222 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

decrypt md5 in php

Good Day.
Is it possible to decrypt MD5 in php?
if it is possible. How can I decrypt it..? Thank you.
Nov 25 '12 #1
3 4082
zmbd
5,501 Expert Mod 4TB
no
MD5 is a digest.
PHP: MD5 - Manual
I very highly advise that you read the RSA link provided in the above site.

Note that MD5, while good, has lost favor within the "family" and now SHA and other digests are prefered. A little research on the subject will turn up more than you'll every want to know.
Nov 25 '12 #2
Hi,
No its not possible.
Please check PHP documentation:

http://php.net/manual/en/function.md5.php
Dec 20 '12 #3
Atli
5,058 Expert 4TB
Note that MD5, while good, has lost favor within the "family"...
This part isn't exactly accurate. I'd putting it more like: MD5, while good fifteen years ago, has this last decade lost favor within the "family"... due to the fact that it is no longer strong enough to stand up to the processing power of modern hardware.

MD5 is a relatively weak hashing algorithm to begin with (128 bits). They got away with it 15-10 years ago because the hardware back then was also relatively weak. These days, even fairly easily affordable hardware can brute-force MD5 hashes pretty quickly, and rainbow-tables for MD5 hashes are easy to generate with modern database software, effectively giving potential "hackers" a hash collision look-up table, removing the need to even brute-force or crack the hash at all.

And this is not even taking into account vulnerabilities in the algorithm itself, of which there are allegedly a few. Both MD5 and SHA1 have been known to succumb to collisions, which makes them weak candidates for any sort of security related hashing. (Despite the fact that those are the two of the most used algorithms for SSL/TLS signature hashes...)

The stronger SHA2 algorithm, the SHA256-SHA512 variants, are much better choices for that, although the old "salted hash" methodology may no longer be suitable for things like password hashing at all, due to the ready availability of processing power these days. That's mostly thanks to the modern PC's ability to run multiple, easily programmable, extremely powerful graphics processing units (GPUs) in addition to their multi-processor, multi-core CPU capabilities.

For security purposes, you may want to consider using PBKDF2, bcrypt, or even scrypt. (In order from weakest to strongest... arguably.)
Dec 21 '12 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: Mark Hanford | last post by:
I've been setting up a new MySQL/PHP site which will contain store some CC details, and have been wondering how to pass the keys. CC's are written in a similar way to: INSERT INTO cc (ccName,...
1
by: Benoît | last post by:
Hi, I have generated two keys : "C:>openssl req -nodes -new -x509 -keyout ben.key -out ben.crt -days 3650" I try to encrypt/decrypt a string like "JOHN" with these asymetrics keys. With the...
3
by: Jimski | last post by:
Hello all, I am having a problem where I get an error message when I call FlushFinalBlock when decrypting my encrypted text. I am using the Rijndael algorithm. The error message is "Length...
8
by: Gidi | last post by:
Hi, Is there Buid-In fuction in C# that Encrypt and Decrypt strings? i have a textbox which i'm writing into file, and i want to encrypt it before writing, i'm not looking for something fancy,...
7
by: Dica | last post by:
i've used the sample code from msdn to create an encyption/decryption assembly as found here: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/SecNetHT10.asp i'm...
0
by: Hannibal111111 | last post by:
I found this code on a site for doing string encryption/decryption. The string will encrypt fine, but I get this error when I try to decrypt. Any idea why? I posted the code below. The error...
3
by: JDeats | last post by:
I have some .NET 1.1 code that utilizes this technique for encrypting and decrypting a file. http://support.microsoft.com/kb/307010 In .NET 2.0 this approach is not fully supported (a .NET 2.0...
1
by: MimiMi | last post by:
I'm trying to decrypt a byte array in java that was encrypted in C#. I don't get any error messages, just a result that's completely not what I was hoping for. I think I am using the same type of...
2
by: MimiMi | last post by:
I'm trying to decrypt a byte array in java that was encrypted in C#. I don't get any error messages, just a result that's completely not what I was hoping for. I think I am using the same type of...
2
bferguson94
by: bferguson94 | last post by:
Design a program that allows the user to encrypt or decrypt a file. This means you will need to ask the user the direction to shift (left or right) and the number of places to shift (should they...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.