Md5 decode
![md5 decode md5 decode](https://3.bp.blogspot.com/-GpRce4-WVsQ/V3bLJuOhD3I/AAAAAAAAAzg/udPZS1u9l4Y-EZ3kNmRYWScAKenWK33zQCLcB/s1600/md5-c%2523.png)
Means we are hashing again the user entered password/OTP and matching it against the stored hashed key.
![md5 decode md5 decode](https://qrznow.com/wp-content/uploads/2019/03/dj-md5_1.jpg)
We only want to confirm that the current string(user entered value) is the same string for which we stored the hashed key. MD5 is a hashing function it means we are using it where we have to authenticate something in future and also at that point we are not interested in the original string while authenticating.
Md5 decode password#
it is very easy to get the original string (password/OTP) from the md5 hashed key for simple password or OTP.md5 doesn’t have any internal salt creation mechanism as some other hashing algorithm such as BCrypt(based on Blowfish Cipher) has.Yes, but with the appropriate salt, Using the md5 for storing critical data such as password and OTP in the database without appropriate salt is not recommendable and md5 should not be used without salt because: Now the question arises, Is MD5 secure enough to use in the process of storing any important data such as password, OTP etc? Since it will take a lot of computation and also a lot of storage to maintain this mapped database, Instead of that we can use the online md5 decrypting website like based on the same technique.
![md5 decode md5 decode](https://2.bp.blogspot.com/-cYTEC38uzvE/WZT9UzwwFsI/AAAAAAAAADw/9vmmaMtg_3g_HsorTVxGNVDtGvdzkhGGACEwYBhgL/s1600/2.png)
So, we can search for any particular hash key to decrypt. Then finally, we will have the hash key of every string. If we create a database of all possible original string by permutating their character sequence.