| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
Network Working Group R. Rivest |
| 7 |
Request for Comments: 1321 MIT Laboratory for Computer Science |
| 8 |
and RSA Data Security, Inc. |
| 9 |
April 1992 |
| 10 |
|
| 11 |
|
| 12 |
The MD5 Message-Digest Algorithm |
| 13 |
|
| 14 |
Status of this Memo |
| 15 |
|
| 16 |
This memo provides information for the Internet community. It does |
| 17 |
not specify an Internet standard. Distribution of this memo is |
| 18 |
unlimited. |
| 19 |
|
| 20 |
Acknowlegements |
| 21 |
|
| 22 |
We would like to thank Don Coppersmith, Burt Kaliski, Ralph Merkle, |
| 23 |
David Chaum, and Noam Nisan for numerous helpful comments and |
| 24 |
suggestions. |
| 25 |
|
| 26 |
Table of Contents |
| 27 |
|
| 28 |
1. Executive Summary 1 |
| 29 |
2. Terminology and Notation 2 |
| 30 |
3. MD5 Algorithm Description 3 |
| 31 |
4. Summary 6 |
| 32 |
5. Differences Between MD4 and MD5 6 |
| 33 |
References 7 |
| 34 |
APPENDIX A - Reference Implementation 7 |
| 35 |
Security Considerations 21 |
| 36 |
Author's Address 21 |
| 37 |
|
| 38 |
1. Executive Summary |
| 39 |
|
| 40 |
This document describes the MD5 message-digest algorithm. The |
| 41 |
algorithm takes as input a message of arbitrary length and produces |
| 42 |
as output a 128-bit "fingerprint" or "message digest" of the input. |
| 43 |
It is conjectured that it is computationally infeasible to produce |
| 44 |
two messages having the same message digest, or to produce any |
| 45 |
message having a given prespecified target message digest. The MD5 |
| 46 |
algorithm is intended for digital signature applications, where a |
| 47 |
large file must be "compressed" in a secure manner before being |
| 48 |
encrypted with a private (secret) key under a public-key cryptosystem |
| 49 |
such as RSA. |
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
Rivest [Page 1] |
| 58 |
|
| 59 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 60 |
|
| 61 |
|
| 62 |
The MD5 algorithm is designed to be quite fast on 32-bit machines. In |
| 63 |
addition, the MD5 algorithm does not require any large substitution |
| 64 |
tables; the algorithm can be coded quite compactly. |
| 65 |
|
| 66 |
The MD5 algorithm is an extension of the MD4 message-digest algorithm |
| 67 |
1,2]. MD5 is slightly slower than MD4, but is more "conservative" in |
| 68 |
design. MD5 was designed because it was felt that MD4 was perhaps |
| 69 |
being adopted for use more quickly than justified by the existing |
| 70 |
critical review; because MD4 was designed to be exceptionally fast, |
| 71 |
it is "at the edge" in terms of risking successful cryptanalytic |
| 72 |
attack. MD5 backs off a bit, giving up a little in speed for a much |
| 73 |
greater likelihood of ultimate security. It incorporates some |
| 74 |
suggestions made by various reviewers, and contains additional |
| 75 |
optimizations. The MD5 algorithm is being placed in the public domain |
| 76 |
for review and possible adoption as a standard. |
| 77 |
|
| 78 |
For OSI-based applications, MD5's object identifier is |
| 79 |
|
| 80 |
md5 OBJECT IDENTIFIER ::= |
| 81 |
iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) 5} |
| 82 |
|
| 83 |
In the X.509 type AlgorithmIdentifier [3], the parameters for MD5 |
| 84 |
should have type NULL. |
| 85 |
|
| 86 |
2. Terminology and Notation |
| 87 |
|
| 88 |
In this document a "word" is a 32-bit quantity and a "byte" is an |
| 89 |
eight-bit quantity. A sequence of bits can be interpreted in a |
| 90 |
natural manner as a sequence of bytes, where each consecutive group |
| 91 |
of eight bits is interpreted as a byte with the high-order (most |
| 92 |
significant) bit of each byte listed first. Similarly, a sequence of |
| 93 |
bytes can be interpreted as a sequence of 32-bit words, where each |
| 94 |
consecutive group of four bytes is interpreted as a word with the |
| 95 |
low-order (least significant) byte given first. |
| 96 |
|
| 97 |
Let x_i denote "x sub i". If the subscript is an expression, we |
| 98 |
surround it in braces, as in x_{i+1}. Similarly, we use ^ for |
| 99 |
superscripts (exponentiation), so that x^i denotes x to the i-th |
| 100 |
power. |
| 101 |
|
| 102 |
Let the symbol "+" denote addition of words (i.e., modulo-2^32 |
| 103 |
addition). Let X <<< s denote the 32-bit value obtained by circularly |
| 104 |
shifting (rotating) X left by s bit positions. Let not(X) denote the |
| 105 |
bit-wise complement of X, and let X v Y denote the bit-wise OR of X |
| 106 |
and Y. Let X xor Y denote the bit-wise XOR of X and Y, and let XY |
| 107 |
denote the bit-wise AND of X and Y. |
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
Rivest [Page 2] |
| 114 |
|
| 115 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 116 |
|
| 117 |
|
| 118 |
3. MD5 Algorithm Description |
| 119 |
|
| 120 |
We begin by supposing that we have a b-bit message as input, and that |
| 121 |
we wish to find its message digest. Here b is an arbitrary |
| 122 |
nonnegative integer; b may be zero, it need not be a multiple of |
| 123 |
eight, and it may be arbitrarily large. We imagine the bits of the |
| 124 |
message written down as follows: |
| 125 |
|
| 126 |
m_0 m_1 ... m_{b-1} |
| 127 |
|
| 128 |
The following five steps are performed to compute the message digest |
| 129 |
of the message. |
| 130 |
|
| 131 |
3.1 Step 1. Append Padding Bits |
| 132 |
|
| 133 |
The message is "padded" (extended) so that its length (in bits) is |
| 134 |
congruent to 448, modulo 512. That is, the message is extended so |
| 135 |
that it is just 64 bits shy of being a multiple of 512 bits long. |
| 136 |
Padding is always performed, even if the length of the message is |
| 137 |
already congruent to 448, modulo 512. |
| 138 |
|
| 139 |
Padding is performed as follows: a single "1" bit is appended to the |
| 140 |
message, and then "0" bits are appended so that the length in bits of |
| 141 |
the padded message becomes congruent to 448, modulo 512. In all, at |
| 142 |
least one bit and at most 512 bits are appended. |
| 143 |
|
| 144 |
3.2 Step 2. Append Length |
| 145 |
|
| 146 |
A 64-bit representation of b (the length of the message before the |
| 147 |
padding bits were added) is appended to the result of the previous |
| 148 |
step. In the unlikely event that b is greater than 2^64, then only |
| 149 |
the low-order 64 bits of b are used. (These bits are appended as two |
| 150 |
32-bit words and appended low-order word first in accordance with the |
| 151 |
previous conventions.) |
| 152 |
|
| 153 |
At this point the resulting message (after padding with bits and with |
| 154 |
b) has a length that is an exact multiple of 512 bits. Equivalently, |
| 155 |
this message has a length that is an exact multiple of 16 (32-bit) |
| 156 |
words. Let M[0 ... N-1] denote the words of the resulting message, |
| 157 |
where N is a multiple of 16. |
| 158 |
|
| 159 |
3.3 Step 3. Initialize MD Buffer |
| 160 |
|
| 161 |
A four-word buffer (A,B,C,D) is used to compute the message digest. |
| 162 |
Here each of A, B, C, D is a 32-bit register. These registers are |
| 163 |
initialized to the following values in hexadecimal, low-order bytes |
| 164 |
first): |
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
Rivest [Page 3] |
| 170 |
|
| 171 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 172 |
|
| 173 |
|
| 174 |
word A: 01 23 45 67 |
| 175 |
word B: 89 ab cd ef |
| 176 |
word C: fe dc ba 98 |
| 177 |
word D: 76 54 32 10 |
| 178 |
|
| 179 |
3.4 Step 4. Process Message in 16-Word Blocks |
| 180 |
|
| 181 |
We first define four auxiliary functions that each take as input |
| 182 |
three 32-bit words and produce as output one 32-bit word. |
| 183 |
|
| 184 |
F(X,Y,Z) = XY v not(X) Z |
| 185 |
G(X,Y,Z) = XZ v Y not(Z) |
| 186 |
H(X,Y,Z) = X xor Y xor Z |
| 187 |
I(X,Y,Z) = Y xor (X v not(Z)) |
| 188 |
|
| 189 |
In each bit position F acts as a conditional: if X then Y else Z. |
| 190 |
The function F could have been defined using + instead of v since XY |
| 191 |
and not(X)Z will never have 1's in the same bit position.) It is |
| 192 |
interesting to note that if the bits of X, Y, and Z are independent |
| 193 |
and unbiased, the each bit of F(X,Y,Z) will be independent and |
| 194 |
unbiased. |
| 195 |
|
| 196 |
The functions G, H, and I are similar to the function F, in that they |
| 197 |
act in "bitwise parallel" to produce their output from the bits of X, |
| 198 |
Y, and Z, in such a manner that if the corresponding bits of X, Y, |
| 199 |
and Z are independent and unbiased, then each bit of G(X,Y,Z), |
| 200 |
H(X,Y,Z), and I(X,Y,Z) will be independent and unbiased. Note that |
| 201 |
the function H is the bit-wise "xor" or "parity" function of its |
| 202 |
inputs. |
| 203 |
|
| 204 |
This step uses a 64-element table T[1 ... 64] constructed from the |
| 205 |
sine function. Let T[i] denote the i-th element of the table, which |
| 206 |
is equal to the integer part of 4294967296 times abs(sin(i)), where i |
| 207 |
is in radians. The elements of the table are given in the appendix. |
| 208 |
|
| 209 |
Do the following: |
| 210 |
|
| 211 |
/* Process each 16-word block. */ |
| 212 |
For i = 0 to N/16-1 do |
| 213 |
|
| 214 |
/* Copy block i into X. */ |
| 215 |
For j = 0 to 15 do |
| 216 |
Set X[j] to M[i*16+j]. |
| 217 |
end /* of loop on j */ |
| 218 |
|
| 219 |
/* Save A as AA, B as BB, C as CC, and D as DD. */ |
| 220 |
AA = A |
| 221 |
BB = B |
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
Rivest [Page 4] |
| 226 |
|
| 227 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 228 |
|
| 229 |
|
| 230 |
CC = C |
| 231 |
DD = D |
| 232 |
|
| 233 |
/* Round 1. */ |
| 234 |
/* Let [abcd k s i] denote the operation |
| 235 |
a = b + ((a + F(b,c,d) + X[k] + T[i]) <<< s). */ |
| 236 |
/* Do the following 16 operations. */ |
| 237 |
[ABCD 0 7 1] [DABC 1 12 2] [CDAB 2 17 3] [BCDA 3 22 4] |
| 238 |
[ABCD 4 7 5] [DABC 5 12 6] [CDAB 6 17 7] [BCDA 7 22 8] |
| 239 |
[ABCD 8 7 9] [DABC 9 12 10] [CDAB 10 17 11] [BCDA 11 22 12] |
| 240 |
[ABCD 12 7 13] [DABC 13 12 14] [CDAB 14 17 15] [BCDA 15 22 16] |
| 241 |
|
| 242 |
/* Round 2. */ |
| 243 |
/* Let [abcd k s i] denote the operation |
| 244 |
a = b + ((a + G(b,c,d) + X[k] + T[i]) <<< s). */ |
| 245 |
/* Do the following 16 operations. */ |
| 246 |
[ABCD 1 5 17] [DABC 6 9 18] [CDAB 11 14 19] [BCDA 0 20 20] |
| 247 |
[ABCD 5 5 21] [DABC 10 9 22] [CDAB 15 14 23] [BCDA 4 20 24] |
| 248 |
[ABCD 9 5 25] [DABC 14 9 26] [CDAB 3 14 27] [BCDA 8 20 28] |
| 249 |
[ABCD 13 5 29] [DABC 2 9 30] [CDAB 7 14 31] [BCDA 12 20 32] |
| 250 |
|
| 251 |
/* Round 3. */ |
| 252 |
/* Let [abcd k s t] denote the operation |
| 253 |
a = b + ((a + H(b,c,d) + X[k] + T[i]) <<< s). */ |
| 254 |
/* Do the following 16 operations. */ |
| 255 |
[ABCD 5 4 33] [DABC 8 11 34] [CDAB 11 16 35] [BCDA 14 23 36] |
| 256 |
[ABCD 1 4 37] [DABC 4 11 38] [CDAB 7 16 39] [BCDA 10 23 40] |
| 257 |
[ABCD 13 4 41] [DABC 0 11 42] [CDAB 3 16 43] [BCDA 6 23 44] |
| 258 |
[ABCD 9 4 45] [DABC 12 11 46] [CDAB 15 16 47] [BCDA 2 23 48] |
| 259 |
|
| 260 |
/* Round 4. */ |
| 261 |
/* Let [abcd k s t] denote the operation |
| 262 |
a = b + ((a + I(b,c,d) + X[k] + T[i]) <<< s). */ |
| 263 |
/* Do the following 16 operations. */ |
| 264 |
[ABCD 0 6 49] [DABC 7 10 50] [CDAB 14 15 51] [BCDA 5 21 52] |
| 265 |
[ABCD 12 6 53] [DABC 3 10 54] [CDAB 10 15 55] [BCDA 1 21 56] |
| 266 |
[ABCD 8 6 57] [DABC 15 10 58] [CDAB 6 15 59] [BCDA 13 21 60] |
| 267 |
[ABCD 4 6 61] [DABC 11 10 62] [CDAB 2 15 63] [BCDA 9 21 64] |
| 268 |
|
| 269 |
/* Then perform the following additions. (That is increment each |
| 270 |
of the four registers by the value it had before this block |
| 271 |
was started.) */ |
| 272 |
A = A + AA |
| 273 |
B = B + BB |
| 274 |
C = C + CC |
| 275 |
D = D + DD |
| 276 |
|
| 277 |
end /* of loop on i */ |
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
Rivest [Page 5] |
| 282 |
|
| 283 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 284 |
|
| 285 |
|
| 286 |
3.5 Step 5. Output |
| 287 |
|
| 288 |
The message digest produced as output is A, B, C, D. That is, we |
| 289 |
begin with the low-order byte of A, and end with the high-order byte |
| 290 |
of D. |
| 291 |
|
| 292 |
This completes the description of MD5. A reference implementation in |
| 293 |
C is given in the appendix. |
| 294 |
|
| 295 |
4. Summary |
| 296 |
|
| 297 |
The MD5 message-digest algorithm is simple to implement, and provides |
| 298 |
a "fingerprint" or message digest of a message of arbitrary length. |
| 299 |
It is conjectured that the difficulty of coming up with two messages |
| 300 |
having the same message digest is on the order of 2^64 operations, |
| 301 |
and that the difficulty of coming up with any message having a given |
| 302 |
message digest is on the order of 2^128 operations. The MD5 algorithm |
| 303 |
has been carefully scrutinized for weaknesses. It is, however, a |
| 304 |
relatively new algorithm and further security analysis is of course |
| 305 |
justified, as is the case with any new proposal of this sort. |
| 306 |
|
| 307 |
5. Differences Between MD4 and MD5 |
| 308 |
|
| 309 |
The following are the differences between MD4 and MD5: |
| 310 |
|
| 311 |
1. A fourth round has been added. |
| 312 |
|
| 313 |
2. Each step now has a unique additive constant. |
| 314 |
|
| 315 |
3. The function g in round 2 was changed from (XY v XZ v YZ) to |
| 316 |
(XZ v Y not(Z)) to make g less symmetric. |
| 317 |
|
| 318 |
4. Each step now adds in the result of the previous step. This |
| 319 |
promotes a faster "avalanche effect". |
| 320 |
|
| 321 |
5. The order in which input words are accessed in rounds 2 and |
| 322 |
3 is changed, to make these patterns less like each other. |
| 323 |
|
| 324 |
6. The shift amounts in each round have been approximately |
| 325 |
optimized, to yield a faster "avalanche effect." The shifts in |
| 326 |
different rounds are distinct. |
| 327 |
|
| 328 |
|
| 329 |
|
| 330 |
|
| 331 |
|
| 332 |
|
| 333 |
|
| 334 |
|
| 335 |
|
| 336 |
|
| 337 |
Rivest [Page 6] |
| 338 |
|
| 339 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 340 |
|
| 341 |
|
| 342 |
References |
| 343 |
|
| 344 |
[1] Rivest, R., "The MD4 Message Digest Algorithm", RFC 1320, MIT and |
| 345 |
RSA Data Security, Inc., April 1992. |
| 346 |
|
| 347 |
[2] Rivest, R., "The MD4 message digest algorithm", in A.J. Menezes |
| 348 |
and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90 |
| 349 |
Proceedings, pages 303-311, Springer-Verlag, 1991. |
| 350 |
|
| 351 |
[3] CCITT Recommendation X.509 (1988), "The Directory - |
| 352 |
Authentication Framework." |
| 353 |
|
| 354 |
APPENDIX A - Reference Implementation |
| 355 |
|
| 356 |
This appendix contains the following files taken from RSAREF: A |
| 357 |
Cryptographic Toolkit for Privacy-Enhanced Mail: |
| 358 |
|
| 359 |
global.h -- global header file |
| 360 |
|
| 361 |
md5.h -- header file for MD5 |
| 362 |
|
| 363 |
md5c.c -- source code for MD5 |
| 364 |
|
| 365 |
For more information on RSAREF, send email to <rsaref@rsa.com>. |
| 366 |
|
| 367 |
The appendix also includes the following file: |
| 368 |
|
| 369 |
mddriver.c -- test driver for MD2, MD4 and MD5 |
| 370 |
|
| 371 |
The driver compiles for MD5 by default but can compile for MD2 or MD4 |
| 372 |
if the symbol MD is defined on the C compiler command line as 2 or 4. |
| 373 |
|
| 374 |
The implementation is portable and should work on many different |
| 375 |
plaforms. However, it is not difficult to optimize the implementation |
| 376 |
on particular platforms, an exercise left to the reader. For example, |
| 377 |
on "little-endian" platforms where the lowest-addressed byte in a 32- |
| 378 |
bit word is the least significant and there are no alignment |
| 379 |
restrictions, the call to Decode in MD5Transform can be replaced with |
| 380 |
a typecast. |
| 381 |
|
| 382 |
A.1 global.h |
| 383 |
|
| 384 |
/* GLOBAL.H - RSAREF types and constants |
| 385 |
*/ |
| 386 |
|
| 387 |
/* PROTOTYPES should be set to one if and only if the compiler supports |
| 388 |
function argument prototyping. |
| 389 |
The following makes PROTOTYPES default to 0 if it has not already |
| 390 |
|
| 391 |
|
| 392 |
|
| 393 |
Rivest [Page 7] |
| 394 |
|
| 395 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 396 |
|
| 397 |
|
| 398 |
been defined with C compiler flags. |
| 399 |
*/ |
| 400 |
#ifndef PROTOTYPES |
| 401 |
#define PROTOTYPES 0 |
| 402 |
#endif |
| 403 |
|
| 404 |
/* POINTER defines a generic pointer type */ |
| 405 |
typedef unsigned char *POINTER; |
| 406 |
|
| 407 |
/* UINT2 defines a two byte word */ |
| 408 |
typedef unsigned short int UINT2; |
| 409 |
|
| 410 |
/* UINT4 defines a four byte word */ |
| 411 |
typedef unsigned long int UINT4; |
| 412 |
|
| 413 |
/* PROTO_LIST is defined depending on how PROTOTYPES is defined above. |
| 414 |
If using PROTOTYPES, then PROTO_LIST returns the list, otherwise it |
| 415 |
returns an empty list. |
| 416 |
*/ |
| 417 |
#if PROTOTYPES |
| 418 |
#define PROTO_LIST(list) list |
| 419 |
#else |
| 420 |
#define PROTO_LIST(list) () |
| 421 |
#endif |
| 422 |
|
| 423 |
A.2 md5.h |
| 424 |
|
| 425 |
/* MD5.H - header file for MD5C.C |
| 426 |
*/ |
| 427 |
|
| 428 |
/* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All |
| 429 |
rights reserved. |
| 430 |
|
| 431 |
License to copy and use this software is granted provided that it |
| 432 |
is identified as the "RSA Data Security, Inc. MD5 Message-Digest |
| 433 |
Algorithm" in all material mentioning or referencing this software |
| 434 |
or this function. |
| 435 |
|
| 436 |
License is also granted to make and use derivative works provided |
| 437 |
that such works are identified as "derived from the RSA Data |
| 438 |
Security, Inc. MD5 Message-Digest Algorithm" in all material |
| 439 |
mentioning or referencing the derived work. |
| 440 |
|
| 441 |
RSA Data Security, Inc. makes no representations concerning either |
| 442 |
the merchantability of this software or the suitability of this |
| 443 |
software for any particular purpose. It is provided "as is" |
| 444 |
without express or implied warranty of any kind. |
| 445 |
|
| 446 |
|
| 447 |
|
| 448 |
|
| 449 |
Rivest [Page 8] |
| 450 |
|
| 451 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 452 |
|
| 453 |
|
| 454 |
These notices must be retained in any copies of any part of this |
| 455 |
documentation and/or software. |
| 456 |
*/ |
| 457 |
|
| 458 |
/* MD5 context. */ |
| 459 |
typedef struct { |
| 460 |
UINT4 state[4]; /* state (ABCD) */ |
| 461 |
UINT4 count[2]; /* number of bits, modulo 2^64 (lsb first) */ |
| 462 |
unsigned char buffer[64]; /* input buffer */ |
| 463 |
} MD5_CTX; |
| 464 |
|
| 465 |
void MD5Init PROTO_LIST ((MD5_CTX *)); |
| 466 |
void MD5Update PROTO_LIST |
| 467 |
((MD5_CTX *, unsigned char *, unsigned int)); |
| 468 |
void MD5Final PROTO_LIST ((unsigned char [16], MD5_CTX *)); |
| 469 |
|
| 470 |
A.3 md5c.c |
| 471 |
|
| 472 |
/* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm |
| 473 |
*/ |
| 474 |
|
| 475 |
/* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All |
| 476 |
rights reserved. |
| 477 |
|
| 478 |
License to copy and use this software is granted provided that it |
| 479 |
is identified as the "RSA Data Security, Inc. MD5 Message-Digest |
| 480 |
Algorithm" in all material mentioning or referencing this software |
| 481 |
or this function. |
| 482 |
|
| 483 |
License is also granted to make and use derivative works provided |
| 484 |
that such works are identified as "derived from the RSA Data |
| 485 |
Security, Inc. MD5 Message-Digest Algorithm" in all material |
| 486 |
mentioning or referencing the derived work. |
| 487 |
|
| 488 |
RSA Data Security, Inc. makes no representations concerning either |
| 489 |
the merchantability of this software or the suitability of this |
| 490 |
software for any particular purpose. It is provided "as is" |
| 491 |
without express or implied warranty of any kind. |
| 492 |
|
| 493 |
These notices must be retained in any copies of any part of this |
| 494 |
documentation and/or software. |
| 495 |
*/ |
| 496 |
|
| 497 |
#include "global.h" |
| 498 |
#include "md5.h" |
| 499 |
|
| 500 |
/* Constants for MD5Transform routine. |
| 501 |
*/ |
| 502 |
|
| 503 |
|
| 504 |
|
| 505 |
Rivest [Page 9] |
| 506 |
|
| 507 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 508 |
|
| 509 |
|
| 510 |
#define S11 7 |
| 511 |
#define S12 12 |
| 512 |
#define S13 17 |
| 513 |
#define S14 22 |
| 514 |
#define S21 5 |
| 515 |
#define S22 9 |
| 516 |
#define S23 14 |
| 517 |
#define S24 20 |
| 518 |
#define S31 4 |
| 519 |
#define S32 11 |
| 520 |
#define S33 16 |
| 521 |
#define S34 23 |
| 522 |
#define S41 6 |
| 523 |
#define S42 10 |
| 524 |
#define S43 15 |
| 525 |
#define S44 21 |
| 526 |
|
| 527 |
static void MD5Transform PROTO_LIST ((UINT4 [4], unsigned char [64])); |
| 528 |
static void Encode PROTO_LIST |
| 529 |
((unsigned char *, UINT4 *, unsigned int)); |
| 530 |
static void Decode PROTO_LIST |
| 531 |
((UINT4 *, unsigned char *, unsigned int)); |
| 532 |
static void MD5_memcpy PROTO_LIST ((POINTER, POINTER, unsigned int)); |
| 533 |
static void MD5_memset PROTO_LIST ((POINTER, int, unsigned int)); |
| 534 |
|
| 535 |
static unsigned char PADDING[64] = { |
| 536 |
0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 537 |
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 538 |
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 |
| 539 |
}; |
| 540 |
|
| 541 |
/* F, G, H and I are basic MD5 functions. |
| 542 |
*/ |
| 543 |
#define F(x, y, z) (((x) & (y)) | ((~x) & (z))) |
| 544 |
#define G(x, y, z) (((x) & (z)) | ((y) & (~z))) |
| 545 |
#define H(x, y, z) ((x) ^ (y) ^ (z)) |
| 546 |
#define I(x, y, z) ((y) ^ ((x) | (~z))) |
| 547 |
|
| 548 |
/* ROTATE_LEFT rotates x left n bits. |
| 549 |
*/ |
| 550 |
#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n)))) |
| 551 |
|
| 552 |
/* FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4. |
| 553 |
Rotation is separate from addition to prevent recomputation. |
| 554 |
*/ |
| 555 |
#define FF(a, b, c, d, x, s, ac) { \ |
| 556 |
(a) += F ((b), (c), (d)) + (x) + (UINT4)(ac); \ |
| 557 |
(a) = ROTATE_LEFT ((a), (s)); \ |
| 558 |
|
| 559 |
|
| 560 |
|
| 561 |
Rivest [Page 10] |
| 562 |
|
| 563 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 564 |
|
| 565 |
|
| 566 |
(a) += (b); \ |
| 567 |
} |
| 568 |
#define GG(a, b, c, d, x, s, ac) { \ |
| 569 |
(a) += G ((b), (c), (d)) + (x) + (UINT4)(ac); \ |
| 570 |
(a) = ROTATE_LEFT ((a), (s)); \ |
| 571 |
(a) += (b); \ |
| 572 |
} |
| 573 |
#define HH(a, b, c, d, x, s, ac) { \ |
| 574 |
(a) += H ((b), (c), (d)) + (x) + (UINT4)(ac); \ |
| 575 |
(a) = ROTATE_LEFT ((a), (s)); \ |
| 576 |
(a) += (b); \ |
| 577 |
} |
| 578 |
#define II(a, b, c, d, x, s, ac) { \ |
| 579 |
(a) += I ((b), (c), (d)) + (x) + (UINT4)(ac); \ |
| 580 |
(a) = ROTATE_LEFT ((a), (s)); \ |
| 581 |
(a) += (b); \ |
| 582 |
} |
| 583 |
|
| 584 |
/* MD5 initialization. Begins an MD5 operation, writing a new context. |
| 585 |
*/ |
| 586 |
void MD5Init (context) |
| 587 |
MD5_CTX *context; /* context */ |
| 588 |
{ |
| 589 |
context->count[0] = context->count[1] = 0; |
| 590 |
/* Load magic initialization constants. |
| 591 |
*/ |
| 592 |
context->state[0] = 0x67452301; |
| 593 |
context->state[1] = 0xefcdab89; |
| 594 |
context->state[2] = 0x98badcfe; |
| 595 |
context->state[3] = 0x10325476; |
| 596 |
} |
| 597 |
|
| 598 |
/* MD5 block update operation. Continues an MD5 message-digest |
| 599 |
operation, processing another message block, and updating the |
| 600 |
context. |
| 601 |
*/ |
| 602 |
void MD5Update (context, input, inputLen) |
| 603 |
MD5_CTX *context; /* context */ |
| 604 |
unsigned char *input; /* input block */ |
| 605 |
unsigned int inputLen; /* length of input block */ |
| 606 |
{ |
| 607 |
unsigned int i, index, partLen; |
| 608 |
|
| 609 |
/* Compute number of bytes mod 64 */ |
| 610 |
index = (unsigned int)((context->count[0] >> 3) & 0x3F); |
| 611 |
|
| 612 |
/* Update number of bits */ |
| 613 |
if ((context->count[0] += ((UINT4)inputLen << 3)) |
| 614 |
|
| 615 |
|
| 616 |
|
| 617 |
Rivest [Page 11] |
| 618 |
|
| 619 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 620 |
|
| 621 |
|
| 622 |
< ((UINT4)inputLen << 3)) |
| 623 |
context->count[1]++; |
| 624 |
context->count[1] += ((UINT4)inputLen >> 29); |
| 625 |
|
| 626 |
partLen = 64 - index; |
| 627 |
|
| 628 |
/* Transform as many times as possible. |
| 629 |
*/ |
| 630 |
if (inputLen >= partLen) { |
| 631 |
MD5_memcpy |
| 632 |
((POINTER)&context->buffer[index], (POINTER)input, partLen); |
| 633 |
MD5Transform (context->state, context->buffer); |
| 634 |
|
| 635 |
for (i = partLen; i + 63 < inputLen; i += 64) |
| 636 |
MD5Transform (context->state, &input[i]); |
| 637 |
|
| 638 |
index = 0; |
| 639 |
} |
| 640 |
else |
| 641 |
i = 0; |
| 642 |
|
| 643 |
/* Buffer remaining input */ |
| 644 |
MD5_memcpy |
| 645 |
((POINTER)&context->buffer[index], (POINTER)&input[i], |
| 646 |
inputLen-i); |
| 647 |
} |
| 648 |
|
| 649 |
/* MD5 finalization. Ends an MD5 message-digest operation, writing the |
| 650 |
the message digest and zeroizing the context. |
| 651 |
*/ |
| 652 |
void MD5Final (digest, context) |
| 653 |
unsigned char digest[16]; /* message digest */ |
| 654 |
MD5_CTX *context; /* context */ |
| 655 |
{ |
| 656 |
unsigned char bits[8]; |
| 657 |
unsigned int index, padLen; |
| 658 |
|
| 659 |
/* Save number of bits */ |
| 660 |
Encode (bits, context->count, 8); |
| 661 |
|
| 662 |
/* Pad out to 56 mod 64. |
| 663 |
*/ |
| 664 |
index = (unsigned int)((context->count[0] >> 3) & 0x3f); |
| 665 |
padLen = (index < 56) ? (56 - index) : (120 - index); |
| 666 |
MD5Update (context, PADDING, padLen); |
| 667 |
|
| 668 |
/* Append length (before padding) */ |
| 669 |
MD5Update (context, bits, 8); |
| 670 |
|
| 671 |
|
| 672 |
|
| 673 |
Rivest [Page 12] |
| 674 |
|
| 675 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 676 |
|
| 677 |
|
| 678 |
/* Store state in digest */ |
| 679 |
Encode (digest, context->state, 16); |
| 680 |
|
| 681 |
/* Zeroize sensitive information. |
| 682 |
*/ |
| 683 |
MD5_memset ((POINTER)context, 0, sizeof (*context)); |
| 684 |
} |
| 685 |
|
| 686 |
/* MD5 basic transformation. Transforms state based on block. |
| 687 |
*/ |
| 688 |
static void MD5Transform (state, block) |
| 689 |
UINT4 state[4]; |
| 690 |
unsigned char block[64]; |
| 691 |
{ |
| 692 |
UINT4 a = state[0], b = state[1], c = state[2], d = state[3], x[16]; |
| 693 |
|
| 694 |
Decode (x, block, 64); |
| 695 |
|
| 696 |
/* Round 1 */ |
| 697 |
FF (a, b, c, d, x[ 0], S11, 0xd76aa478); /* 1 */ |
| 698 |
FF (d, a, b, c, x[ 1], S12, 0xe8c7b756); /* 2 */ |
| 699 |
FF (c, d, a, b, x[ 2], S13, 0x242070db); /* 3 */ |
| 700 |
FF (b, c, d, a, x[ 3], S14, 0xc1bdceee); /* 4 */ |
| 701 |
FF (a, b, c, d, x[ 4], S11, 0xf57c0faf); /* 5 */ |
| 702 |
FF (d, a, b, c, x[ 5], S12, 0x4787c62a); /* 6 */ |
| 703 |
FF (c, d, a, b, x[ 6], S13, 0xa8304613); /* 7 */ |
| 704 |
FF (b, c, d, a, x[ 7], S14, 0xfd469501); /* 8 */ |
| 705 |
FF (a, b, c, d, x[ 8], S11, 0x698098d8); /* 9 */ |
| 706 |
FF (d, a, b, c, x[ 9], S12, 0x8b44f7af); /* 10 */ |
| 707 |
FF (c, d, a, b, x[10], S13, 0xffff5bb1); /* 11 */ |
| 708 |
FF (b, c, d, a, x[11], S14, 0x895cd7be); /* 12 */ |
| 709 |
FF (a, b, c, d, x[12], S11, 0x6b901122); /* 13 */ |
| 710 |
FF (d, a, b, c, x[13], S12, 0xfd987193); /* 14 */ |
| 711 |
FF (c, d, a, b, x[14], S13, 0xa679438e); /* 15 */ |
| 712 |
FF (b, c, d, a, x[15], S14, 0x49b40821); /* 16 */ |
| 713 |
|
| 714 |
/* Round 2 */ |
| 715 |
GG (a, b, c, d, x[ 1], S21, 0xf61e2562); /* 17 */ |
| 716 |
GG (d, a, b, c, x[ 6], S22, 0xc040b340); /* 18 */ |
| 717 |
GG (c, d, a, b, x[11], S23, 0x265e5a51); /* 19 */ |
| 718 |
GG (b, c, d, a, x[ 0], S24, 0xe9b6c7aa); /* 20 */ |
| 719 |
GG (a, b, c, d, x[ 5], S21, 0xd62f105d); /* 21 */ |
| 720 |
GG (d, a, b, c, x[10], S22, 0x2441453); /* 22 */ |
| 721 |
GG (c, d, a, b, x[15], S23, 0xd8a1e681); /* 23 */ |
| 722 |
GG (b, c, d, a, x[ 4], S24, 0xe7d3fbc8); /* 24 */ |
| 723 |
GG (a, b, c, d, x[ 9], S21, 0x21e1cde6); /* 25 */ |
| 724 |
GG (d, a, b, c, x[14], S22, 0xc33707d6); /* 26 */ |
| 725 |
GG (c, d, a, b, x[ 3], S23, 0xf4d50d87); /* 27 */ |
| 726 |
|
| 727 |
|
| 728 |
|
| 729 |
Rivest [Page 13] |
| 730 |
|
| 731 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 732 |
|
| 733 |
|
| 734 |
GG (b, c, d, a, x[ 8], S24, 0x455a14ed); /* 28 */ |
| 735 |
GG (a, b, c, d, x[13], S21, 0xa9e3e905); /* 29 */ |
| 736 |
GG (d, a, b, c, x[ 2], S22, 0xfcefa3f8); /* 30 */ |
| 737 |
GG (c, d, a, b, x[ 7], S23, 0x676f02d9); /* 31 */ |
| 738 |
GG (b, c, d, a, x[12], S24, 0x8d2a4c8a); /* 32 */ |
| 739 |
|
| 740 |
/* Round 3 */ |
| 741 |
HH (a, b, c, d, x[ 5], S31, 0xfffa3942); /* 33 */ |
| 742 |
HH (d, a, b, c, x[ 8], S32, 0x8771f681); /* 34 */ |
| 743 |
HH (c, d, a, b, x[11], S33, 0x6d9d6122); /* 35 */ |
| 744 |
HH (b, c, d, a, x[14], S34, 0xfde5380c); /* 36 */ |
| 745 |
HH (a, b, c, d, x[ 1], S31, 0xa4beea44); /* 37 */ |
| 746 |
HH (d, a, b, c, x[ 4], S32, 0x4bdecfa9); /* 38 */ |
| 747 |
HH (c, d, a, b, x[ 7], S33, 0xf6bb4b60); /* 39 */ |
| 748 |
HH (b, c, d, a, x[10], S34, 0xbebfbc70); /* 40 */ |
| 749 |
HH (a, b, c, d, x[13], S31, 0x289b7ec6); /* 41 */ |
| 750 |
HH (d, a, b, c, x[ 0], S32, 0xeaa127fa); /* 42 */ |
| 751 |
HH (c, d, a, b, x[ 3], S33, 0xd4ef3085); /* 43 */ |
| 752 |
HH (b, c, d, a, x[ 6], S34, 0x4881d05); /* 44 */ |
| 753 |
HH (a, b, c, d, x[ 9], S31, 0xd9d4d039); /* 45 */ |
| 754 |
HH (d, a, b, c, x[12], S32, 0xe6db99e5); /* 46 */ |
| 755 |
HH (c, d, a, b, x[15], S33, 0x1fa27cf8); /* 47 */ |
| 756 |
HH (b, c, d, a, x[ 2], S34, 0xc4ac5665); /* 48 */ |
| 757 |
|
| 758 |
/* Round 4 */ |
| 759 |
II (a, b, c, d, x[ 0], S41, 0xf4292244); /* 49 */ |
| 760 |
II (d, a, b, c, x[ 7], S42, 0x432aff97); /* 50 */ |
| 761 |
II (c, d, a, b, x[14], S43, 0xab9423a7); /* 51 */ |
| 762 |
II (b, c, d, a, x[ 5], S44, 0xfc93a039); /* 52 */ |
| 763 |
II (a, b, c, d, x[12], S41, 0x655b59c3); /* 53 */ |
| 764 |
II (d, a, b, c, x[ 3], S42, 0x8f0ccc92); /* 54 */ |
| 765 |
II (c, d, a, b, x[10], S43, 0xffeff47d); /* 55 */ |
| 766 |
II (b, c, d, a, x[ 1], S44, 0x85845dd1); /* 56 */ |
| 767 |
II (a, b, c, d, x[ 8], S41, 0x6fa87e4f); /* 57 */ |
| 768 |
II (d, a, b, c, x[15], S42, 0xfe2ce6e0); /* 58 */ |
| 769 |
II (c, d, a, b, x[ 6], S43, 0xa3014314); /* 59 */ |
| 770 |
II (b, c, d, a, x[13], S44, 0x4e0811a1); /* 60 */ |
| 771 |
II (a, b, c, d, x[ 4], S41, 0xf7537e82); /* 61 */ |
| 772 |
II (d, a, b, c, x[11], S42, 0xbd3af235); /* 62 */ |
| 773 |
II (c, d, a, b, x[ 2], S43, 0x2ad7d2bb); /* 63 */ |
| 774 |
II (b, c, d, a, x[ 9], S44, 0xeb86d391); /* 64 */ |
| 775 |
|
| 776 |
state[0] += a; |
| 777 |
state[1] += b; |
| 778 |
state[2] += c; |
| 779 |
state[3] += d; |
| 780 |
|
| 781 |
/* Zeroize sensitive information. |
| 782 |
|
| 783 |
|
| 784 |
|
| 785 |
Rivest [Page 14] |
| 786 |
|
| 787 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 788 |
|
| 789 |
|
| 790 |
*/ |
| 791 |
MD5_memset ((POINTER)x, 0, sizeof (x)); |
| 792 |
} |
| 793 |
|
| 794 |
/* Encodes input (UINT4) into output (unsigned char). Assumes len is |
| 795 |
a multiple of 4. |
| 796 |
*/ |
| 797 |
static void Encode (output, input, len) |
| 798 |
unsigned char *output; |
| 799 |
UINT4 *input; |
| 800 |
unsigned int len; |
| 801 |
{ |
| 802 |
unsigned int i, j; |
| 803 |
|
| 804 |
for (i = 0, j = 0; j < len; i++, j += 4) { |
| 805 |
output[j] = (unsigned char)(input[i] & 0xff); |
| 806 |
output[j+1] = (unsigned char)((input[i] >> 8) & 0xff); |
| 807 |
output[j+2] = (unsigned char)((input[i] >> 16) & 0xff); |
| 808 |
output[j+3] = (unsigned char)((input[i] >> 24) & 0xff); |
| 809 |
} |
| 810 |
} |
| 811 |
|
| 812 |
/* Decodes input (unsigned char) into output (UINT4). Assumes len is |
| 813 |
a multiple of 4. |
| 814 |
*/ |
| 815 |
static void Decode (output, input, len) |
| 816 |
UINT4 *output; |
| 817 |
unsigned char *input; |
| 818 |
unsigned int len; |
| 819 |
{ |
| 820 |
unsigned int i, j; |
| 821 |
|
| 822 |
for (i = 0, j = 0; j < len; i++, j += 4) |
| 823 |
output[i] = ((UINT4)input[j]) | (((UINT4)input[j+1]) << 8) | |
| 824 |
(((UINT4)input[j+2]) << 16) | (((UINT4)input[j+3]) << 24); |
| 825 |
} |
| 826 |
|
| 827 |
/* Note: Replace "for loop" with standard memcpy if possible. |
| 828 |
*/ |
| 829 |
|
| 830 |
static void MD5_memcpy (output, input, len) |
| 831 |
POINTER output; |
| 832 |
POINTER input; |
| 833 |
unsigned int len; |
| 834 |
{ |
| 835 |
unsigned int i; |
| 836 |
|
| 837 |
for (i = 0; i < len; i++) |
| 838 |
|
| 839 |
|
| 840 |
|
| 841 |
Rivest [Page 15] |
| 842 |
|
| 843 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 844 |
|
| 845 |
|
| 846 |
output[i] = input[i]; |
| 847 |
} |
| 848 |
|
| 849 |
/* Note: Replace "for loop" with standard memset if possible. |
| 850 |
*/ |
| 851 |
static void MD5_memset (output, value, len) |
| 852 |
POINTER output; |
| 853 |
int value; |
| 854 |
unsigned int len; |
| 855 |
{ |
| 856 |
unsigned int i; |
| 857 |
|
| 858 |
for (i = 0; i < len; i++) |
| 859 |
((char *)output)[i] = (char)value; |
| 860 |
} |
| 861 |
|
| 862 |
A.4 mddriver.c |
| 863 |
|
| 864 |
/* MDDRIVER.C - test driver for MD2, MD4 and MD5 |
| 865 |
*/ |
| 866 |
|
| 867 |
/* Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All |
| 868 |
rights reserved. |
| 869 |
|
| 870 |
RSA Data Security, Inc. makes no representations concerning either |
| 871 |
the merchantability of this software or the suitability of this |
| 872 |
software for any particular purpose. It is provided "as is" |
| 873 |
without express or implied warranty of any kind. |
| 874 |
|
| 875 |
These notices must be retained in any copies of any part of this |
| 876 |
documentation and/or software. |
| 877 |
*/ |
| 878 |
|
| 879 |
/* The following makes MD default to MD5 if it has not already been |
| 880 |
defined with C compiler flags. |
| 881 |
*/ |
| 882 |
#ifndef MD |
| 883 |
#define MD MD5 |
| 884 |
#endif |
| 885 |
|
| 886 |
#include <stdio.h> |
| 887 |
#include <time.h> |
| 888 |
#include <string.h> |
| 889 |
#include "global.h" |
| 890 |
#if MD == 2 |
| 891 |
#include "md2.h" |
| 892 |
#endif |
| 893 |
#if MD == 4 |
| 894 |
|
| 895 |
|
| 896 |
|
| 897 |
Rivest [Page 16] |
| 898 |
|
| 899 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 900 |
|
| 901 |
|
| 902 |
#include "md4.h" |
| 903 |
#endif |
| 904 |
#if MD == 5 |
| 905 |
#include "md5.h" |
| 906 |
#endif |
| 907 |
|
| 908 |
/* Length of test block, number of test blocks. |
| 909 |
*/ |
| 910 |
#define TEST_BLOCK_LEN 1000 |
| 911 |
#define TEST_BLOCK_COUNT 1000 |
| 912 |
|
| 913 |
static void MDString PROTO_LIST ((char *)); |
| 914 |
static void MDTimeTrial PROTO_LIST ((void)); |
| 915 |
static void MDTestSuite PROTO_LIST ((void)); |
| 916 |
static void MDFile PROTO_LIST ((char *)); |
| 917 |
static void MDFilter PROTO_LIST ((void)); |
| 918 |
static void MDPrint PROTO_LIST ((unsigned char [16])); |
| 919 |
|
| 920 |
#if MD == 2 |
| 921 |
#define MD_CTX MD2_CTX |
| 922 |
#define MDInit MD2Init |
| 923 |
#define MDUpdate MD2Update |
| 924 |
#define MDFinal MD2Final |
| 925 |
#endif |
| 926 |
#if MD == 4 |
| 927 |
#define MD_CTX MD4_CTX |
| 928 |
#define MDInit MD4Init |
| 929 |
#define MDUpdate MD4Update |
| 930 |
#define MDFinal MD4Final |
| 931 |
#endif |
| 932 |
#if MD == 5 |
| 933 |
#define MD_CTX MD5_CTX |
| 934 |
#define MDInit MD5Init |
| 935 |
#define MDUpdate MD5Update |
| 936 |
#define MDFinal MD5Final |
| 937 |
#endif |
| 938 |
|
| 939 |
/* Main driver. |
| 940 |
|
| 941 |
Arguments (may be any combination): |
| 942 |
-sstring - digests string |
| 943 |
-t - runs time trial |
| 944 |
-x - runs test script |
| 945 |
filename - digests file |
| 946 |
(none) - digests standard input |
| 947 |
*/ |
| 948 |
int main (argc, argv) |
| 949 |
int argc; |
| 950 |
|
| 951 |
|
| 952 |
|
| 953 |
Rivest [Page 17] |
| 954 |
|
| 955 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 956 |
|
| 957 |
|
| 958 |
char *argv[]; |
| 959 |
{ |
| 960 |
int i; |
| 961 |
|
| 962 |
if (argc > 1) |
| 963 |
for (i = 1; i < argc; i++) |
| 964 |
if (argv[i][0] == '-' && argv[i][1] == 's') |
| 965 |
MDString (argv[i] + 2); |
| 966 |
else if (strcmp (argv[i], "-t") == 0) |
| 967 |
MDTimeTrial (); |
| 968 |
else if (strcmp (argv[i], "-x") == 0) |
| 969 |
MDTestSuite (); |
| 970 |
else |
| 971 |
MDFile (argv[i]); |
| 972 |
else |
| 973 |
MDFilter (); |
| 974 |
|
| 975 |
return (0); |
| 976 |
} |
| 977 |
|
| 978 |
/* Digests a string and prints the result. |
| 979 |
*/ |
| 980 |
static void MDString (string) |
| 981 |
char *string; |
| 982 |
{ |
| 983 |
MD_CTX context; |
| 984 |
unsigned char digest[16]; |
| 985 |
unsigned int len = strlen (string); |
| 986 |
|
| 987 |
MDInit (&context); |
| 988 |
MDUpdate (&context, string, len); |
| 989 |
MDFinal (digest, &context); |
| 990 |
|
| 991 |
printf ("MD%d (\"%s\") = ", MD, string); |
| 992 |
MDPrint (digest); |
| 993 |
printf ("\n"); |
| 994 |
} |
| 995 |
|
| 996 |
/* Measures the time to digest TEST_BLOCK_COUNT TEST_BLOCK_LEN-byte |
| 997 |
blocks. |
| 998 |
*/ |
| 999 |
static void MDTimeTrial () |
| 1000 |
{ |
| 1001 |
MD_CTX context; |
| 1002 |
time_t endTime, startTime; |
| 1003 |
unsigned char block[TEST_BLOCK_LEN], digest[16]; |
| 1004 |
unsigned int i; |
| 1005 |
|
| 1006 |
|
| 1007 |
|
| 1008 |
|
| 1009 |
Rivest [Page 18] |
| 1010 |
|
| 1011 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 1012 |
|
| 1013 |
|
| 1014 |
printf |
| 1015 |
("MD%d time trial. Digesting %d %d-byte blocks ...", MD, |
| 1016 |
TEST_BLOCK_LEN, TEST_BLOCK_COUNT); |
| 1017 |
|
| 1018 |
/* Initialize block */ |
| 1019 |
for (i = 0; i < TEST_BLOCK_LEN; i++) |
| 1020 |
block[i] = (unsigned char)(i & 0xff); |
| 1021 |
|
| 1022 |
/* Start timer */ |
| 1023 |
time (&startTime); |
| 1024 |
|
| 1025 |
/* Digest blocks */ |
| 1026 |
MDInit (&context); |
| 1027 |
for (i = 0; i < TEST_BLOCK_COUNT; i++) |
| 1028 |
MDUpdate (&context, block, TEST_BLOCK_LEN); |
| 1029 |
MDFinal (digest, &context); |
| 1030 |
|
| 1031 |
/* Stop timer */ |
| 1032 |
time (&endTime); |
| 1033 |
|
| 1034 |
printf (" done\n"); |
| 1035 |
printf ("Digest = "); |
| 1036 |
MDPrint (digest); |
| 1037 |
printf ("\nTime = %ld seconds\n", (long)(endTime-startTime)); |
| 1038 |
printf |
| 1039 |
("Speed = %ld bytes/second\n", |
| 1040 |
(long)TEST_BLOCK_LEN * (long)TEST_BLOCK_COUNT/(endTime-startTime)); |
| 1041 |
} |
| 1042 |
|
| 1043 |
/* Digests a reference suite of strings and prints the results. |
| 1044 |
*/ |
| 1045 |
static void MDTestSuite () |
| 1046 |
{ |
| 1047 |
printf ("MD%d test suite:\n", MD); |
| 1048 |
|
| 1049 |
MDString (""); |
| 1050 |
MDString ("a"); |
| 1051 |
MDString ("abc"); |
| 1052 |
MDString ("message digest"); |
| 1053 |
MDString ("abcdefghijklmnopqrstuvwxyz"); |
| 1054 |
MDString |
| 1055 |
("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| 1056 |
MDString |
| 1057 |
("1234567890123456789012345678901234567890\ |
| 1058 |
1234567890123456789012345678901234567890"); |
| 1059 |
} |
| 1060 |
|
| 1061 |
/* Digests a file and prints the result. |
| 1062 |
|
| 1063 |
|
| 1064 |
|
| 1065 |
Rivest [Page 19] |
| 1066 |
|
| 1067 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 1068 |
|
| 1069 |
|
| 1070 |
*/ |
| 1071 |
static void MDFile (filename) |
| 1072 |
char *filename; |
| 1073 |
{ |
| 1074 |
FILE *file; |
| 1075 |
MD_CTX context; |
| 1076 |
int len; |
| 1077 |
unsigned char buffer[1024], digest[16]; |
| 1078 |
|
| 1079 |
if ((file = fopen (filename, "rb")) == NULL) |
| 1080 |
printf ("%s can't be opened\n", filename); |
| 1081 |
|
| 1082 |
else { |
| 1083 |
MDInit (&context); |
| 1084 |
while (len = fread (buffer, 1, 1024, file)) |
| 1085 |
MDUpdate (&context, buffer, len); |
| 1086 |
MDFinal (digest, &context); |
| 1087 |
|
| 1088 |
fclose (file); |
| 1089 |
|
| 1090 |
printf ("MD%d (%s) = ", MD, filename); |
| 1091 |
MDPrint (digest); |
| 1092 |
printf ("\n"); |
| 1093 |
} |
| 1094 |
} |
| 1095 |
|
| 1096 |
/* Digests the standard input and prints the result. |
| 1097 |
*/ |
| 1098 |
static void MDFilter () |
| 1099 |
{ |
| 1100 |
MD_CTX context; |
| 1101 |
int len; |
| 1102 |
unsigned char buffer[16], digest[16]; |
| 1103 |
|
| 1104 |
MDInit (&context); |
| 1105 |
while (len = fread (buffer, 1, 16, stdin)) |
| 1106 |
MDUpdate (&context, buffer, len); |
| 1107 |
MDFinal (digest, &context); |
| 1108 |
|
| 1109 |
MDPrint (digest); |
| 1110 |
printf ("\n"); |
| 1111 |
} |
| 1112 |
|
| 1113 |
/* Prints a message digest in hexadecimal. |
| 1114 |
*/ |
| 1115 |
static void MDPrint (digest) |
| 1116 |
unsigned char digest[16]; |
| 1117 |
{ |
| 1118 |
|
| 1119 |
|
| 1120 |
|
| 1121 |
Rivest [Page 20] |
| 1122 |
|
| 1123 |
RFC 1321 MD5 Message-Digest Algorithm April 1992 |
| 1124 |
|
| 1125 |
|
| 1126 |
unsigned int i; |
| 1127 |
|
| 1128 |
for (i = 0; i < 16; i++) |
| 1129 |
printf ("%02x", digest[i]); |
| 1130 |
} |
| 1131 |
|
| 1132 |
A.5 Test suite |
| 1133 |
|
| 1134 |
The MD5 test suite (driver option "-x") should print the following |
| 1135 |
results: |
| 1136 |
|
| 1137 |
MD5 test suite: |
| 1138 |
MD5 ("") = d41d8cd98f00b204e9800998ecf8427e |
| 1139 |
MD5 ("a") = 0cc175b9c0f1b6a831c399e269772661 |
| 1140 |
MD5 ("abc") = 900150983cd24fb0d6963f7d28e17f72 |
| 1141 |
MD5 ("message digest") = f96b697d7cb7938d525a2f31aaf161d0 |
| 1142 |
MD5 ("abcdefghijklmnopqrstuvwxyz") = c3fcd3d76192e4007dfb496cca67e13b |
| 1143 |
MD5 ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") = |
| 1144 |
d174ab98d277d9f5a5611c2c9f419d9f |
| 1145 |
MD5 ("123456789012345678901234567890123456789012345678901234567890123456 |
| 1146 |
78901234567890") = 57edf4a22be3c955ac49da2e2107b67a |
| 1147 |
|
| 1148 |
Security Considerations |
| 1149 |
|
| 1150 |
The level of security discussed in this memo is considered to be |
| 1151 |
sufficient for implementing very high security hybrid digital- |
| 1152 |
signature schemes based on MD5 and a public-key cryptosystem. |
| 1153 |
|
| 1154 |
Author's Address |
| 1155 |
|
| 1156 |
Ronald L. Rivest |
| 1157 |
Massachusetts Institute of Technology |
| 1158 |
Laboratory for Computer Science |
| 1159 |
NE43-324 |
| 1160 |
545 Technology Square |
| 1161 |
Cambridge, MA 02139-1986 |
| 1162 |
|
| 1163 |
Phone: (617) 253-5880 |
| 1164 |
EMail: rivest@theory.lcs.mit.edu |
| 1165 |
|
| 1166 |
|
| 1167 |
|
| 1168 |
|
| 1169 |
|
| 1170 |
|
| 1171 |
|
| 1172 |
|
| 1173 |
|
| 1174 |
|
| 1175 |
|
| 1176 |
|
| 1177 |
Rivest [Page 21] |
| 1178 |
|
| 1179 |
|