The following functions are provided by the Digest::MD5 module. None of these functions are exported by default.



Similar documents
Perl version documentation - Digest::SHA NAME SYNOPSIS SYNOPSIS (HMAC-SHA) Page 1

The Keyed-Hash Message Authentication Code (HMAC)

Waspmote Encryption Libraries. Programming guide

Project: Simulated Encrypted File System (SEFS)

Package PKI. July 28, 2015

Chapter 4: Computer Codes

Randomized Hashing for Digital Signatures

Logging. Working with the POCO logging framework.

Mirasys NVR 6.2. System Monitor Quick Guide

Network Security Technology Network Management

KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon

Advanced Encryption Standard (AES) User's Guide

NDK: Novell edirectory Core Services. novdocx (en) 24 April Novell Developer Kit. NOVELL EDIRECTORY TM CORE SERVICES.

SkyRecon Cryptographic Module (SCM)

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Package PKI. February 20, 2013

Process Control and Automation using Modbus Protocol

How to represent characters?

MarshallSoft AES. (Advanced Encryption Standard) Reference Manual

CA Nimsoft Unified Management Portal

Sheet 7 (Chapter 10)

OCRA Validation Server Profile

C++ Programming Language

Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0

TechNote 0006: Digital Signatures in PDF/A-1

Practical Attacks on Digital Signatures Using MD5 Message Digest

WORKSPACE WEB DEVELOPMENT & OUTSOURCING TRAINING CENTER

Number Representation

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR

Glossary of Object Oriented Terms

SNARE Agent for Windows v Release Notes

Survey of Disk Image Storage Formats

Ecma/TC39/2013/NN. 4 th Draft ECMA-XXX. 1 st Edition / July The JSON Data Interchange Format. Reference number ECMA-123:2009

Hexadecimal Object File Format Specification

Cryptography and Network Security

Chapter 6 Electronic Mail Security

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

KITES TECHNOLOGY COURSE MODULE (C, C++, DS)

Digital Evidence Search Kit

How To Understand The History Of Anntds.Dntd.Dt.Dotnetdt Database On A Pc Or Macbook (Windows) With A Password Key (For A Macbook) And Password History (For Annt

Compilers. Introduction to Compilers. Lecture 1. Spring term. Mick O Donnell: michael.odonnell@uam.es Alfonso Ortega: alfonso.ortega@uam.

Elements of Security

CAPE-OPEN Expanding Process Modelling Capability through Software Interoperability Standards

AS DNB banka. DNB Link specification (B2B functional description)

#!/usr/bin/perl use strict; use warnings; use Carp; use Data::Dumper; use Tie::IxHash; use Gschem 3; 3. Setup and initialize the global variables.

Intel Hexadecimal Object File Format Specification Revision A, 1/6/88

$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

A Mechanism for VHDL Source Protection

AWS Encryption SDK. Developer Guide

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

4D Plugin SDK v11. Another minor change, real values on 10 bytes is no longer supported.

Image Verification. Finding Feature Information. Restrictions for Image Verification

Cryptography and Network Security Chapter 15

Qualtrics Single Sign-On Specification

[MD5 Message Digests] derived from the RSA Data Security, Inc. MD5 Message Digest Algorithm

# Constructors $smtp = Net::SMTP->new('mailhost'); $smtp = Net::SMTP->new('mailhost', Timeout => 60);

Java Interview Questions and Answers

Network Security Essentials Chapter 7

Merkle Hash Trees for Distributed Audit Logs

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

EMC DATA DOMAIN ENCRYPTION A Detailed Review

etrust Audit Using the Recorder for Check Point FireWall-1 1.5

Lecture 9: Application of Cryptography

ios Team Administration Guide (Legacy)

SNMP Reference Manual

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Mobility-Enhanced File Integrity Analyzer For Networked Environments

John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011

Object Transfer Service

MONETA.Assistant API Reference

Section 1.4 Place Value Systems of Numeration in Other Bases

requests_toolbelt Documentation

CSCI 253. Object Oriented Programming (OOP) Overview. George Blankenship 1. Object Oriented Design: Java Review OOP George Blankenship.

Avid Technology, Inc. inews NRCS. inews FTP Server Protocol Specification. Version January 2006

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Lab 7. Answer. Figure 1

CA DLP. Release Notes for Advanced Encryption. r12.0

Programming Languages

How To Write Portable Programs In C

A NEW HASH ALGORITHM: Khichidi-1

AIMMS Function Reference - Data Change Monitor Functions

CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It

Japanese Character Printers EPL2 Programming Manual Addendum

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Internet Banking Two-Factor Authentication using Smartphones

Encrypted Connections

The Unicode Standard Version 8.0 Core Specification

Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December Document issue: 2.0

Encrypting and signing

Caml Virtual Machine File & data formats Document version: 1.4

Transcription:

NAME SYNOPSIS Digest::MD5 - Perl interface to the MD5 Algorithm # Functional style use Digest::MD5 qw(md5 md5_hex md5_base64); $digest = md5($data); $digest = md5_hex($data); $digest = md5_base64($data); # OO style $ctx = Digest::MD5->new; $ctx->add($data); $ctx->addfile(*file); DESCRIPTION FUNCTIONS $digest = $ctx->digest; $digest = $ctx->hexdigest; $digest = $ctx->b64digest; The Digest::MD5 module allows you to use the RSA Data Security Inc. MD5 Message Digest algorithm from within Perl programs. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. Note that the MD5 algorithm is not as strong as it used to be. It has since 2005 been easy to generate different messages that produce the same MD5 digest. It still seems hard to generate messages that produce a given digest, but it is probably wise to move to stronger algorithms for applications that depend on the digest to uniquely identify a message. The Digest::MD5 module provide a procedural interface for simple use, as well as an object oriented interface that can handle messages of arbitrary length and which can read files directly. The following functions are provided by the Digest::MD5 module. None of these functions are exported by default. md5($data,...) This function will concatenate all arguments, calculate the MD5 digest of this "message", and return it in binary form. The returned string will be 16 bytes long. The result of md5("a", "b", "c") will be exactly the same as the result of md5("abc"). md5_hex($data,...) Same as md5(), but will return the digest in hexadecimal form. The length of the returned string will be 32 and it will only contain characters from this set: '0'..'9' and 'a'..'f'. md5_base64($data,...) Same as md5(), but will return the digest as a base64 encoded string. The length of the returned string will be 22 and it will only contain characters from this set: 'A'..'Z', 'a'..'z', '0'..'9', '+' and '/'. Page 1

METHODS Note that the base64 encoded string returned is not padded to be a multiple of 4 bytes long. If you want interoperability with other base64 encoded md5 digests you might want to append the redundant string "==" to the result. The object oriented interface to Digest::MD5 is described in this section. After a Digest::MD5 object has been created, you will add data to it and finally ask for the digest in a suitable format. A single object can be used to calculate multiple digests. The following methods are provided: $md5 = Digest::MD5->new $md5->reset $md5->clone The constructor returns a new Digest::MD5 object which encapsulate the state of the MD5 message-digest algorithm. If called as an instance method (i.e. $md5->new) it will just reset the state the object to the state of a newly created object. No new object is created in this case. This is just an alias for $md5->new. This a copy of the $md5 object. It is useful when you do not want to destroy the digests state, but need an intermediate value of the digest, e.g. when calculating digests iteratively on a continuous data stream. Example: my $md5 = Digest::MD5->new; while (<>) { $md5->add($_); print "Line $.: ", $md5->clone->hexdigest, "\n"; } $md5->add($data,...) The $data provided as argument are appended to the message we calculate the digest for. The return value is the $md5 object itself. All these lines will have the same effect on the state of the $md5 object: $md5->add("a"); $md5->add("b"); $md5->add("c"); $md5->add("a")->add("b")->add("c"); $md5->add("a", "b", "c"); $md5->add("abc"); $md5->addfile($io_handle) The $io_handle will be read until EOF and its content appended to the message we calculate the digest for. The return value is the $md5 object itself. The addfile() method will croak() if it fails reading data for some reason. If it croaks it is unpredictable what the state of the $md5 object will be in. The addfile() method might have been able to read the file partially before it failed. It is probably wise to discard or reset the $md5 object if this occurs. In most cases you want to make sure that the $io_handle is in binmode before you pass it as argument to the addfile() method. $md5->add_bits($data, $nbits) $md5->add_bits($bitstring) Since the MD5 algorithm is byte oriented you might only add bits as multiples of 8, so you probably want to just use add() instead. The add_bits() method is provided for compatibility Page 2

EXAMPLES $md5->digest with other digest implementations. See Digest for description of the arguments that add_bits() take. Return the binary digest for the message. The returned string will be 16 bytes long. Note that the digest operation is effectively a destructive, read-once operation. Once it has been performed, the Digest::MD5 object is automatically reset and can be used to calculate another digest value. Call $md5->clone->digest if you want to calculate the digest without resetting the digest state. $md5->hexdigest Same as $md5->digest, but will return the digest in hexadecimal form. The length of the returned string will be 32 and it will only contain characters from this set: '0'..'9' and 'a'..'f'. $md5->b64digest Same as $md5->digest, but will return the digest as a base64 encoded string. The length of the returned string will be 22 and it will only contain characters from this set: 'A'..'Z', 'a'..'z', '0'..'9', '+' and '/'. The base64 encoded string returned is not padded to be a multiple of 4 bytes long. If you want interoperability with other base64 encoded md5 digests you might want to append the string "==" to the result. The simplest way to use this library is to import the md5_hex() function (or one of its cousins): print "Digest is ", md5_hex("foobarbaz"), "\n"; The above example would print out the message: Digest is 6df23dc03f9b54cc38a0fc1483df6e21 The same checksum can also be calculated in OO style: $md5 = Digest::MD5->new; $md5->add('foo', 'bar'); $md5->add('baz'); $digest = $md5->hexdigest; print "Digest is $digest\n"; With OO style you can break the message arbitrary. This means that we are no longer limited to have space for the whole message in memory, i.e. we can handle messages of any size. This is useful when calculating checksum for files: my $file = shift "/etc/passwd"; open(file, $file) or die "Can't open '$file': $!"; binmode(file); $md5 = Digest::MD5->new; Page 3

while (<FILE>) { $md5->add($_); } close(file); print $md5->b64digest, " $file\n"; Or we can use the addfile method for more efficient reading of the file: my $file = shift "/etc/passwd"; open(file, $file) or die "Can't open '$file': $!"; binmode(file); print Digest::MD5->new->addfile(*FILE)->hexdigest, " $file\n"; Perl 5.8 support Unicode characters in strings. Since the MD5 algorithm is only defined for strings of bytes, it can not be used on strings that contains chars with ordinal number above 255. The MD5 functions and methods will croak if you try to feed them such input data: my $str = "abc\x{300}"; print md5_hex($str), "\n"; # croaks # Wide character in subroutine entry What you can do is calculate the MD5 checksum of the UTF-8 representation of such strings. This is achieved by filtering the string through encode_utf8() function: use Encode qw(encode_utf8); SEE ALSO my $str = "abc\x{300}"; print md5_hex(encode_utf8($str)), "\n"; # 8c2d46911f3f5a326455f0ed7a8ed3b3 Digest, Digest::MD2, Digest::SHA1, Digest::HMAC md5sum(1) RFC 1321 COPYRIGHT http://en.wikipedia.org/wiki/md5 The paper "How to Break MD5 and Other Hash Functions" by Xiaoyun Wang and Hongbo Yu. This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. Copyright 1998-2003 Gisle Aas. Copyright 1995-1996 Neil Winton. Copyright 1991-1992 RSA Data Security, Inc. Page 4

AUTHORS The MD5 algorithm is defined in RFC 1321. This implementation is derived from the reference C code in RFC 1321 which is covered by the following copyright statement: Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. This copyright does not prohibit distribution of any version of Perl containing this extension under the terms of the GNU or Artistic licenses. The original MD5 interface was written by Neil Winton (N.Winton@axion.bt.co.uk). The Digest::MD5 module is written by Gisle Aas <gisle@activestate.com>. Page 5