| CARVIEW |
md5deep - Latest version 1.13
Quick Links
- Download md5deep
- The md5deep man page
- Changelog
- Quickstart Guide
- Sourceforge project page - Home to md5deep development and feature requests
Introduction
md5deep is a cross-platform set of programs to compute MD5, SHA-1, SHA-256 Tiger, or Whirlpool message digests on an arbitrary number of files. The programs run on Windows, Linux, Cygwin, *BSD, OS X, Solaris, and should run on most other platforms. md5deep is similar to the md5sum program found in the GNU Coreutils package, but has the following additional features:- Recursive operation - md5deep is able to recursive examine an entire directory tree. That is, compute the MD5 for every file in a directory and for every file in every subdirectory.
- Time estimation - md5deep can produce a time estimate when it's processing very large files.
- Comparison mode - md5deep can accept a list of known hashes and compare them to a set of input files. The program can display either those input files that match the list of known hashes or those that do not match. Hashes sets can be drawn from the National Software Reference Library, iLook Investigator, Hashkeeper, or md5sum, and other generic hash generating programs. Users are welcome to add functionality to read other formats too!
- Piecewise hashing - Hash input files in arbitrary blocks
- File type mode - md5deep can process only files of a certain type, such as regular files, block devices, etc.
About MD5
To quote the executive summary of RFC 1321, the official MD5 specification:
[MD5] takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest.Some weaknesses have been found in MD5 and the above statement may no longer be accurate. Please check the current status of MD5 for more information.
The algorithm was originally developed by Professor Ron Rivest of the Massachusetts Institute of Technology. More information on the algorithm can be found in RFC 1321 and in the RSA Cryptography FAQ.
About SHA-1
To quote the start of RFC 3174:
[SHA-1 is used] for computing a condensed representation of a message or a data file. When a message of any length < 264 bits is input, the SHA-1 produces a 160-bit output called a message digest.The algorithm was originally developed by the National Institute of Standards and Technology and is officially defined in FIPS 180-1, published in 1995. (The SHA-1 algoritm also appears in FIPS 180-2, published in 2002. Although the algorithm was not changed, some of the notation was changed to make it more consistent with other algorithms.)
Some weaknesses have been found in SHA-1 and the above statements may no longer be accurate. Please check the current status of SHA-1 for more information.
About SHA-256
To quote the start of FIPS 180-2:
This Standard specifies ... secure hash algorithms ... for computing a condensed representation of electronic data (message). When a message of any length < 264 bits is input to [SHA-256] , the result is an output called a message digest.The algorithm was originally developed by the National Institute of Standards and Technology and is officially defined in FIPS 180-2, published in 2002.
About Tiger
From the Tiger website:Tiger is a fast new hash function, designed to be very fast on modern computers, and in particular on the state-of-the-art 64-bit computers.The algorithm was developed by Ross Anderson and Eli Biham and produces a 192-bit message digest.
About Whirlpool
According to the official Whirlpool homepage,
Whirlpool is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto that operates on messages less than 2256 bits in length, and produces a message digest of 512 bits. WHIRLPOOL has been selected for the NESSIE portfolio of cryptographic primitives. The International Organization for Standardization (ISO) has decided to include the final version of WHIRLPOOL in the revised ISO/IEC 10118-3:2003(E) standard.
Download
Stable Version
The latest stable version of md5deep is version 1.13 and was released on 6 Aug 2007. You can take a look at the complete changelog, but here are the changes in the latest version:
- Fixed error on Win32 in file estimate mode. Although it appeared to be solely cosmetic, the functions to produce the status message could potentially overwrite other memory and create inconsistencies to crash the program
- Changed piecewise hashing size to a 64 bit value. (Believe it or not, this was a problem for some folks!)
- Added -S mode to only display warnings for improperly formatted hashes
- Fixed cosmetic error regarding newlines in -n mode.
- Changed install procedure for man pages. Now using groff .so command instead of symbolic links
- Added support for HP/UX
- Removed make macg5 option. This doesn't work on newer versions of gcc.
- Updated MAX_STRING_LENGTH to 2048 to handle input files with exceedingly long lines
- Moved md5deep.h to main.h
| Version 1.13 | 6 Aug 2007 | Windows binary | SHA256 0acf6d2d51d56fa413374d765585a58ab1abbab9c167f1fc6426af7ea986318a |
| Cygwin binary | |
| source code | SHA256 38a267a5a35444ae584a53afe5db9a643668cc60d94d7f3dcee34778b24127c2 |
Beta Version
There is no beta version of md5deep right now. If you have any problems or would like to see something added to md5deep, please send mail to the developer at md5deep (at) jessekornblum (dot) com or visit the Sourceforge project page .
Older Versions
Older versions of md5deep are available for historical purposes.
Unless you have a truly compelling reason, you shouldn't use these.
| Version | Date | Format | Hash | 1.12 | 3 Apr 2006 | Windows binary | SHA256 d8bc1d242686d4ea59eff38484e50a5789e1288e25b915c3f1f86c09b6e90d82 |
|---|---|---|---|
| Cygwin binary | SHA256 c7ce267c69906e1c4c5c2e120126764b201d5dd8b0c93da424485301782d86c5 | ||
| source code | SHA256 7329647f159735d3014166201057f15e5af551e1daeabc103ec08e6f8c902112 | 1.11 | 31 Mar 2006 | Windows binary | SHA256 169a4fe60ddd5331dfffc7ba7b00f7cde632c1eff922807c7c2570cb784b2bfd |
| Cygwin binary | (never released) | ||
| source code | SHA256 ad865f2d5866074083c78254ce6e73314b238c52e47264a07129eeaa44e109da | 1.10 | 2 Feb 2006 | Windows binary | SHA256 d7cad9c8abf3ccd18ccf64e10c7bd8197da7acb17b25380a3d3f6aee7ca5153c |
| Cygwin binary | SHA256 0e531d971ef955cfa881814b27c13780e1a67acb57cc8e0a7ee607abff1f5f47 | ||
| source code | SHA256 2658956a7e7890d4ebcc1ff152dab9f64e00f71468bc31d120d255476cc7cd8c | 1.9.3 | 5 Jan 2006 | Windows binary | SHA256 f12fd601e90b2c1c02b7ac52084970bf4bb34db3321b5c405e04d4c6e43989b9 |
| Cygwin binary | SHA256 9ff54d5c263da09fd0c755e308497602add6a75a6e040fab0e0f6de3b2a2bce3 | ||
| source code | SHA256 59b66fd801beb87481c178dc9f3485feecdbae55c68c22410b9ce7f20ae7afd1 | 1.9.2 | 14 Nov 2005 | Windows binary | SHA256 0c1aec402920325f068ef81122bf33faabd9ea14a06fc620729b63f51d905fd7 |
| source code | SHA256 efe4168b445d98f7a8b32565c7c068fc3721f60e10af741600c7f44ec00baeec | 1.9.1 | 8 Nov 2005 | Windows binary | SHA256 8e4c46758b47c93d3af0dbdd0d61fdaa75d6fa85e284c6f04529d627d0efdd98 |
| source code | SHA256 d72afa7f5ca93e18c92de75a419cd63d551422576a3c5b3cdd04eb0d36e93b97 | 1.9 | 7 Nov 2005 | Windows binary | SHA256 e2fb74df42cdbdd7d908f9eb35fab122f59a097a3dc418f3f035abc3adbf087a |
| source code | SHA256 8e06f5dd4fc6ff7e93f7807633a2c3319a326a39cef98e40d076cab09369c99b | 1.8 | 8 Aug 2005 | Windows binary | MD5 19e982ee81d9ed2fe3e8eb69fad0739a |
| source code | MD5 2d6e1d1a337c4a7380567419a0c03947 | ||
| 1.7 | 23 May 2005 | Windows binary | 0c2f4b8467dc9ef9c3f6c39b151166f4 |
| source code | 55fda350be1116f33b846245e9f86cb7 | ||
| 1.6 | 5 May 2005 | Windows binary | 0e4d2f4817dd2aa52a74abd874402d39 |
| source code | b87a26c856798457ed10bc9486178453 | 1.5 | 31 Aug 2004 | Windows binary | b5a4538789903e201e76b6169b164f17 |
| source code | 14b94d3a38bd4ea6bcd7a6331fae6030 | ||
| 1.4 | 16 Aug 2004 | Windows binary | 203f88fe704bfc8597aeba0fac4bbe86 |
| source code | 1411130dec66079e22beff7afad73df1 | ||
| 1.3 | 23 Jun 2004 | Windows binary | d1c1eae769e8300b708487f948094cf2 |
| source code | b747ef1eb7bc87df079dfa8cac750081 | ||
| 1.2 | 11 Apr 2004 | Windows binary | c760d94a81bc777bf0ce31dc2f429cec |
| source code | 3d699b18d9a824afe44e943807f0e565 | ||
| 1.1 | 23 Mar 2004 | Windows binary | 95d88abb032620e0c6ed059736c06f7a |
| source code | 7437d7e949103ba52828a59523711cce | ||
| 1.0 | 10 Mar 2004 | Windows binary | 4aca6868dedfc1422af773139de5e25c |
| source code | a7399d48e0cfbe20c2a96981d2aa8f38 | ||
| 0.16 | 6 Mar 2003 | Windows binary | 9a98fe2f11ce9801ab4564acebb05581 |
| source code | a07715c3344524da1270e9eb39f9b9e1 | ||
| 0.15 | 14 Jan 2003 | Windows binary | 4f2b33c774557be2b02ce2d7841cc934 |
|
source code (does not support Mac) |
3de68fa1a1605086f5673a90b2767484 |
About the developer
md5deep was written and is now maintained by Jesse Kornblum. At the time it was originally written, Mr. Kornblum was a Special Agent with the United State Air Force Office of Special Investigations (AFOSI). As such, the program is considered to be a work of the United States Government. Under 17 USC 105, works of the United States Government are not eligible for copyright protection.
Please send all correspondence to md5deep (at) jessekornblum (dot) com.
Acknowledgements
The developer wishes to thank, in no particular order, Andreas Bussjaeger, Peter Chuenkov (aka ODB), Jeff Bryner, Matt Kucenski, Derek Jones, Daniel B. Sedory, Christopher T. Beers, Christophe Devine, Brian Carrier, Matt Harris, Derrick Donnelly, Matt Johnson, Dewayne Duff, Kris Kendall, Paul Alvarez, Ray Gagne, and Ed Kong.This page was last updated on