md5deep

md5deep is a software package used in the computer security, system administration and computer forensics communities to run large numbers of files through any of several different cryptographic digests. It was originally authored by Jesse Kornblum, at the time a Special Agent of the Air Force Office of Special Investigations. As of 2017, he still maintains it.

md5deep (and hashdeep)
Original author(s)Jesse Kornblum
Developer(s)Jesse Kornblum
Stable release
4.4 / January 29, 2014 (2014-01-29)
Repository
Written inC++
Operating systemCross-platform
LicensePublic domain software (except for GPLv2-licensed Tiger hash function from Libgcrypt)
Websitegithub.com/jessek/hashdeep/

The name md5deep is misleading. As of version 2.0, the md5deep package contains several different programs able to perform MD5, SHA-1, SHA-256, Tiger192 and Whirlpool digests, each of them named by the digest type followed by the word deep. Thus, the name may confuse some people into thinking it only provides the MD5 algorithm when the package supports many more.

md5deep can be invoked in several different ways. Typically users operate it recursively, where md5deep walks through one directory at a time giving digests of each file found, and recursing into any subdirectories within. Its recursive behavior is approximately a depth-first search, which has the benefit of presenting files in lexicographical order. On Unix-like systems, similar functionality can be often obtained by combining find with hashing utilities such as md5sum, sha256sum, or tthsum.

md5deep exists for Windows and most Unix-based systems, including OS X. It is present in OS X's Fink, Homebrew and MacPorts projects. Binary packages exist for most free Unix systems. Many vendors initially resist including md5deep as they mistakenly believe its functions can be reproduced with one line of shell scripting.[1] The matching function of the program, however, cannot be done easily in shell.

Because md5deep was written by an employee of the U.S. government, on government time, it is in the public domain. Other software surrounding it, such as graphical front-ends, may be copyrighted.

See also

  • Hash functions MD5, SHA-1, and SHA-2 (which includes SHA-224, SHA-256, SHA-384, SHA-512)

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.