Subject | Re: [IBO] Asta or Direct IP |
---|---|
Author | Dalton Calford |
Post date | 2001-05-31T14:17:38Z |
BTW, don't trust that the lossy routines within MD5 can not be circumvented
allowing you to come up with a short list of possible origional hash seeds.
(this is very possible)
best regards
Dalton
allowing you to come up with a short list of possible origional hash seeds.
(this is very possible)
best regards
Dalton
On Thursday 31 May 2001 09:34, you wrote:
> How is MD5 used to *decode* anything? It is a one-way hash algorithm. I
> know this is kind of off-topic, but I don't understand this part of the
> solution.
>
> At 12:19 PM 5/30/2001 -0400, you wrote:
> >The stored procedure takes the username, password and role as parameters
> > and first decodes them using the md5hash routines. (plus bin_xor) or
> > simple pattern matching.
> >(This is also a very detailed subject, for another email)
>
> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/