MD5 (Message-Digest Algorithm 5) is a widely used hash function that generates a 32-character string (usually in hexadecimal) to represent the digital digest of input data.
MD5 was originally designed by Ronald Rivest in 1991 as an irreversible encryption algorithm.
Although MD5's security is no longer sufficient for use as an encryption standard in cryptography, it is still widely used for data integrity checks and in non-secure scenarios.
What is MD5?
- Irreversibility: The original content cannot be derived directly from the output result.
- Fixed Length: Regardless of the length of the input data, the output length of MD5 is always fixed.
- Uniqueness: Theoretically, each different input will generate a unique output (though hash collisions may occur, so this cannot be completely guaranteed).
Types of MD5 Encryption
With this tool, you can encrypt the input string into the following forms:
- 16-bit lowercase: Extract the middle 16 characters of the 32-bit MD5 result and convert them to lowercase.
- 16-bit uppercase: Extract the middle 16 characters of the 32-bit MD5 result and convert them to uppercase.
- 32-bit lowercase: Standard MD5 encryption result, outputting a 32-bit lowercase hexadecimal string.
- 32-bit uppercase: Convert the standard 32-bit lowercase result to uppercase hexadecimal string.
Usage Instructions
- Input data: Enter the string you want to encrypt in the input box.
- Click the Encrypt button: Click the "MD5 Encrypt" button, and the tool will calculate the encryption result and display it in a table.
- Clear content: Click the "Clear Content" button to remove the input and encryption results.
Example
Assume the input string is hello
, the encryption results are as follows:
Type | Value |
Original String | hello |
16-bit Lowercase | bc4b2a76b9719d91 |
16-bit Uppercase | BC4B2A76B9719D91 |
32-bit Lowercase | 5d41402abc4b2a76b9719d911017c592 |
32-bit Uppercase | 5D41402ABC4B2A76B9719D911017C592 |
Notes
- Irreversibility: The encrypted result cannot be decrypted back to the original content. Please ensure that the original text is backed up before inputting.
- Hash Collisions: In rare cases, different inputs may produce the same hash value (hash collision). This could pose a risk in security-sensitive scenarios.
- Use Cases: This tool is suitable for data verification, quickly generating fixed-length identifiers, and other non-secure scenarios.