Network Math – Message Digest (MD) 5
Let’s talk about a very common mechanism to authenticate or verify a message or file: the ubiquitous MD5 algorithm. This four step process is described in RFC 1321 and they even provide some code examples. So, get your logic hat on and let’s cruise through another network or computer function.
Here are some additional computer and network math videos:
The mighty checksum –
Complements (1s and 2s) –
Cyclical Redundancy Check (CRC) –
Here is some more computer math (ADD, SHIFT, COMPARE, NEGATE):
Part 1 –
Part 2 –
For similar content take a look here:
Books and other products for networkers
Packet Guide to Core Network Protocols:
Packet Guide to Routing and Switching:
Packet Guide to Voice over IP:
Network Engineering Fundamentals:
Advanced Network Engineering:
Virtualization, Networking, and Storage:
[ad_2]
source