|
Have you looked at the code in there? It's not a great example. Everything is done, pretty much, in one class.
|
|
|
|
|
The simplest way,
Understand the concept with simple example. try with more real life example. and then start working on your project.
best luck
Thanks
-Amit Gajjar (MinterProject)
|
|
|
|
|
That really doesn't add much to the discussion, so why bother posting it? The poster has already indicated that he has made some effort here, and that he just needs some pointers. Your answer was the equivalent of, when somebody asks you for directions to some place, you saying, first you should practice driving up and down this street.
|
|
|
|
|
I am just motivating him.... sometimes people need little bit more effort to get the result and those needs some motivation. And i believe so...
I am sorry if this should not be answer.
Thanks
-Amit Gajjar (MinterProject)
|
|
|
|
|
If the question is clear, and not a request for you to write all the code, then you should offer practical advice. Being given the piece of information you need to solve a problem is a much better motivator and is more help for a poster.
|
|
|
|
|
Thanks for the information. i will keep this in mind and will try to use in my next answers
Thanks
-Amit Gajjar (MinterProject)
|
|
|
|
|
Good job. I look forward to seeing your answers.
|
|
|
|
|
Sure, I will try my best.
Thanks
-Amit Gajjar (MinterProject)
|
|
|
|
|
Is it possible to Decrypt email address which is encrypted using MD5
if yes than please provide me solution
Thanks
|
|
|
|
|
MD5 is a hash-algorithm, not an encryption. It's also a one-way operation, meaning that you cannot "decrypt" it.
|
|
|
|
|
No, it's not. MD5 is a one way hash; in other words, you can't "decrypt" it.
|
|
|
|
|
|
|
Considering MD5 is a lossy hash, there's no way to reverse the hash into what created it. It's entirely possible to have to pieces of source material hash into the exact same value.
|
|
|
|
|
Hash is not intended to be lossless. Therefore you can never guarantee that it can be reversed.
|
|
|
|
|
Sure, do you have the private key? or just tons of time a processing power.
|
|
|
|
|
Do you know how MD5 works?? You cannot reverse the hash to get the original content, even with the private key.
|
|
|
|
|
Yes and just because no one has yet decrypted MD5 doesn't mean that it is unbreakable.
If you take the RSA project as an example then you know that any encrypted string can be decrypted.
The hash function takes a know input in a known form(email address) and performs the function to generate the hash. The are very few functions that do not have a proof and you can use random numbers to try an generate a solution also, email addresses are also in a standard format in me@your.us.com there is an "@" and a period before the teminating string and there are limited terminating strings. So if you know the form of the data and the length or max length and the general properties of an email address and the general properties of the hash function you can decrypt the hash given the time. DO NOT CONFUSE what is unbreakable with what is not yet broken.
You can down vote whatever you feel like but a hash is just a function that is yet to be proven or cracked
modified 20-Nov-12 13:57pm.
|
|
|
|
|
Mathlab wrote: no one has yet decrypted MD5 doesn't mean that it is unbreakable
Noone has done it because MD5 is NOT an encryption! It's a lossy, cryptographic hash.
There is no way to get the original content back from the hash. This is especially true since it is known that multiple, very different, sources can generate the exact same hash value. So, how are you going to determine which one was the original content?
There is no way to do this in any way that anyone would consider "production quality code".
|
|
|
|
|
You can use a lossy but even then you know that its a function, you know the form of the string and you can just input random numbers to start. Its not impossible it just impossible right now and even if its a lossy some of the chaacteristics of the email address are used to create the hash.
|
|
|
|
|
The hash function takes a know input in a known form(email address) and performs the function to generate the hash. The are very few functions that do not have a proof and you can use random numbers to try an generate a solution also, email addresses are also in a standard format in me@your.us.com there is an "@" and a period before the teminating string and there are limited terminating strings. So if you know the form of the data and the length or max length and the general properties of an email address and the general properties of the hash function you can decrypt the hash given the time. DO NOT CONFUSE what is unbreakable with what is not yet broken.
You can down vote whatever you feel like but a hash is just a function that is yet to be proven or cracked
|
|
|
|
|
I didn't downvote you.
Re-read the OP's question. Is there some way to get the original email address back from the MD5 hash, TODAY. The answer to his question is "no".
I also have to question the motivation for such an action. If this person had access to a database where the MD5 hash values were exposed and he didn't own the data, it's a security breach that I'm not going to help him with. So, even if the technique did exist today, the answer is still "no".
|
|
|
|
|
He didnt say "today" so you read the question, and the world wasnt made in a day
|
|
|
|
|
It's obviously implied from the context of the question.
What's with you?
|
|
|
|
|
I could ask the same question of you
|
|
|
|