What is MD5 Hash and How to Use it
In this post, I will discuss about one of the interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. At this point, I will not jump into the technical aspects of this algorithm, rather, will tell you about how to make use of this algorithm in your daily life.
Before I tell you about how to use MD5, I would like to share one of my recent experience which made me start using MD5 algorithm.
Recently I made some significant changes and updates to my website and as obvious, I generated a complete backup of the site on my server. I downloaded this backup onto my PC and deleted the original one on the server. But after a few days something went wrong and I wanted to restore the backup that I downloaded. When I tried to restore the backup, I was shocked! The backup file that I used to restore was corrupted.
That means, the backup file that I downloaded onto my PC wasn’t exactly the one that was on my server. The reason is that there occurred some data loss during the download process. Yes, this data loss can happen often when a file is downloaded from the Internet. The file can be corrupted due to any of the following reasons:
Data loss during the download process, due to instability in the Internet connection/server.
The file can be tampered due to virus infections or
Due to Hacker attacks.
So, whenever you download any valuable data from the Internet, it is completely necessary that you check the integrity of the downloaded file. That is, you need to ensure that the downloaded file is exactly the same as that of the original one. In this scenario, the MD5 hash can become handy. All you have to do is generate MD5 hash (or MD5 check-sum) for the intended file on your server.
After you download the file onto your PC, again generate MD5 hash for the downloaded file. Compare these two hashes and if they match, that means the file is downloaded perfectly without any data loss.
A MD5 hash is nothing but a 32 digit hexadecimal number which can be something as follows:
This hash is unique for every file irrespective of it’s size and type. For example, two different executable files (.exe files) with the same size will not have the same MD5 hash even though they are of same type and size. So MD5 hash can be used to uniquely identify a file.
How to use MD5 Hash to check the Integrity of Files?
Suppose you have a file called backup.tar on your server. Before you download, you need to generate MD5 hash for this file on your server. To do so use the following command:
For UNIX:
When you hit ENTER you’ll see something as follows:
This is the MD5 hash for the file backup.tar. After you download this file onto your PC, you can cross check it’s integrity by again re-generating MD5 hash for the downloaded file. If both the hash matches then it means that the file is perfect. Otherwise it means that the file is corrupt. To generate the MD5 hash for the downloaded file on your Windows PC use the following freeware tool:
I hope you like this post. For further doubts and clarifications, please pass your comments. Cheers!
By using/following this site you agree to our Legal Disclaimer

Hello…you Really Rock ! Can i ask u 1 q? do u know how to make a good template for a blog? please reply
I am great fan of urs Srikanth
Is that “md5sum” inbuilt command ?
Or have to install any extra packages?
And another thing is that will it work on linux?
@ funcky
MD5SUM is inbuilt on all UNIX systems. However on Windows your need to install the package. The download link is given in the post itself.
Hi!Thanks for giving lot of knowledge
Thanks Srikanth for such a wonderful tip…but the download link is not working…
hi i really like your article
hey dude…bt hw 2 decrypt d encryptd code….???
Thanks alot ur hacks are great!
Thz for the post.;…:)
Very nice information
Hi sri, i have one doubt , can we convert MD5 hash to a real string(text) , that should be the same used to convert MD5
@ Faizal
MD5 hash is reversible only when you know the method and the key used for encryption. Often this is kept secret and hence it’s not possible to reverse it back in most cases. If you know then you can decrypt (reverse) it back.
you rocks dude i have visited many hacking sites bt this is best awesome but i have problem in compiling file it tels so many errors
how to decrypt md5 hash….
Sir ur posts has been a guide and I love it so much.
I too still ‘ve a problem on compiling file to exe? pls, where u said cd command has been my problem. I need ur help thanks.
Hi Srikanth.
Very good explanation. Just thought you’d like to know I’ve built a web tool for performing MD5 sums. You can use it here: http://www.md5hasher.net
Regards
It is really awsome post about md5 encryption security.Thanks a lot for this post.
how to translate the code???is it any sofware can trnslate it…where?
GOOD SRIKANTH YOU HAVE POSTED WONDERFUL EXPALNTION FOR MD4 AND ANSWERS FOR QUERIES
How can I use MD5 or SHA1 to to generate a hash value for an entire folder or even a jump drive.
Phil
Thanks dude……….really greatttttttt
You are totally awesome dude!! i just love reading your posts. Keep writing more.
Really,you are GOD of hacking.
it’s really incredible. You guys are making technology move to its limits.
Am glad that your making things easier.
Thanks………….
Mr. faraaj sulaimam
nice skills srikant i depreciate u, i just wanted to ask that how can we get the password of “[email protected]” in the form of md5 hash is it possible? i know how to crack that hashes just i dont know is how to get that hashes
need help..
I am sending a file from one server to remote server through sftp.
they(remote server peoples) gave one MD5 Hash string to me.it contains 32 characters(alphanumeric).
what can i do with this MD5 Hash string?
how this MD5 hash string will be use in sending file?
pls advice me
Thanks in advance
i loV u sir … u dnt knw i m really inspired by u …
plzz tl me if ther is any good online couce on internet security or ethical hacking .. ?
m waitin fr ur rpl … thnk u ….
really greate …i also got in same trouble
as it possible to decrypt md5 password if possible then tell me how??????????
how to decrypt an md5 password?
Leave your response!
EMAIL SECURITY »
How Do Email Spam Filters Work
If you are the one who works with emails on a daily basis, you are most likely to be using a SPAM FILTER to ease the job of sifting through a large number of spam emails …
HOW STUFFS WORK »
How Antivirus Software Works
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer.
Even though every one …
HOW-TO GUIDES »
How to Retrieve Clipboard History in Windows
Ever copied a code snippet or text from the web and forgot to paste it before you copied something else? Well, all of us will have an experience of something like this, where we want to …
INTERNET SECURITY »
Access Your Facebook Account with 3 Passwords
Did you know that you can login to your Facebook account using 3 different passwords? Seems interesting isn’t it? Yep! Unlike any other online account which has only one password to access, Facebook lets you …
NETWORK HACKS »
Access Your Facebook Account with 3 Passwords
Did you know that you can login to your Facebook account using 3 different passwords? Seems interesting isn’t it? Yep! Unlike any other online account which has only one password to access, Facebook lets you …
Categories
I am the author and founder of GoHacking.Com. It all started in November 2007 as a small blog with just a few pages.
However, with the passage of time, the blog picked up more traffic and the response from the readers was also increased. This made me take up blogging more seriously.
You can read more about me or get in touch with me on Google+ or contact page.
Most Commented
Blogroll