Comparison between MD5 and symmetric asymmetric encryption

Source: Internet
Author: User
Tags comparison decrypt md5 md5 encryption asymmetric encryption


Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.

1. Introduction
Because this article is relatively simple is not an example of code implementation, on-line MD5 and encryption algorithm many can download their own research, this article is just about the difference
MD5 is an irreversible encryption, it must be remembered is irreversible although now many algorithms can also be decrypted MD5 but MD5 still have a large degree of irreversible, and increase decryption is used double encryption, many of the places used to log in to MD5 encryption, Then some people will ask me to use MD5 encrypt the server how to decrypt it, if you think so wrong. Enter the user's password when logging in this password is MD5 encrypted in the server is also stored in this MD5 character format, that is, the server's data inventory is the format of the string, So why should the server be decrypted, as long as the comparison of the MD5 string sent by your client and its database string comparison on the line, and now the app operators are afraid to save a user's plaintext password this is not responsible for user information. So here must remember MD5 encryption is irreversible a lot of online decryption is just a simple decryption such as you can decrypt to get 9 you know is 1+8=9 or 2+7=9 or 3+6=9, want to decrypt also do not MD5, now MD5 is only used for database storage data.
There is an encryption algorithm that can be decrypted, one is divided into two, a symmetric encryption algorithm, now mostly using AES and DES, and so on, because both the server and the client are using a same key so it can be said to be symmetric encryption, For example, the client with this key to a text encryption server received this string will be decrypted with the same key, another asymmetric encryption is RSA, this encryption is called asymmetric because the client and the server is not the same key divided into public key and secret key. For example, party a generates a pair of keys and then exposes the public key to B or B 1, b 2, b 3 ..., then party B takes the public key to encrypt, and the party a decrypts the secret key. If you remember good, Alipay access is the use of RSA. So RSA is very popular, more suitable for some platform encryption.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.