Using CRC32 and MD5 Differently

Asked 2 years ago, Updated 2 years ago, 78 views

I think CRC32 and MD5 are both commonly used as hash algorithms?

But how do you use it differently?

algorithm hash md5

2022-09-30 17:09

1 Answers

CRC is a cyclic redundancy check
- Easy to implement with hardware
- Small results (32bit for CRC-32)
-
not designed to make reverse computation difficult - Suitable for detecting transmission errors
- Not suitable for detecting tampering
- Full of calculation methods (not standardized)

(cryptological) unidirectional hash (SHA recommended because MD5 is old)
- High compute capacity (not suitable for hardware implementation)
- The calculation results are large (MD5 128bit SHA256 256bit)
-
Designed to make reverse computation extremely difficult - Expensive to use to detect transmission errors
- Detect tampering (as long as it works)
- Standardized calculation

As an actual problem
- CRC is often used to detect short telegram transmission errors at the hardware level. - Unidirectional hashing is often used at the software level to prevent tampering and reverse conversion.

I don't think it's so wrong to understand that


2022-09-30 17:09

If you have any answers or tips


© 2024 OneMinuteCode. All rights reserved.