Parameters of Shenma M33 miner
MD5 SHA1 sha256 these three kinds of essence are summary function, their length MD5 is 128 bits, SHA1 is 160 bits, sha256 is 256 bits
MD5 processes the input information in 512 bit packets, and each packet is divided into 16 32-bit sub packets. After a series of processing, the output of the algorithm is composed of four 32-bit packets, and a 128 bit hash value will be generated after cascading the four 32-bit packets
for messages less than 2 ^ 64 bits in length, SHA1 generates a 160 bit message digest. When a message is received, the message digest can be used to verify the integrity of the data
Thehash value is used as a unique value representing a fixed size of a large amount of data. A small change in the data can result in an unpredictable large number of changes in the hash value. The hash size of sha256 algorithm is 256 bits
{rrrrrrr}
extended data
the application of MD5 algorithm:
1, consistency verification
MD5 can proce an equally unique "digital fingerprint" for any file (regardless of its size, format and quantity). If anyone makes any changes to the file, Its MD5 value, that is, the corresponding "digital fingerprint", will change
MD5 algorithm is widely used in software download station, forum database, system file security and so on
2. The typical application of digital signature
MD5 is to generate fingerprint on a message (byte string) to prevent it from being "tampered"
for example, you can write a paragraph in a file called readme.txt, generate an MD5 value for the readme.txt and record it. Then you can spread the file to others. If others modify any content in the file, you will find that (the two MD5 values are not the same) when you recalculate MD5 for the file
if there is a third-party certification authority, MD5 can also prevent the "repudiation" of the file author, which is the so-called digital signature application
MD5 is also widely used in the login authentication of operating system, such as UNIX, login password of various BSD systems, digital signature and so on. For example, in UNIX system, the user's password is stored in the file system after hash operation with MD5 (or other similar algorithm)