Why SHA256 VERSUS MD5?

Discussion in 'all things UNIX' started by bellgamin, Jan 18, 2022.

  1. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    Are bunches of hackers out to get Linux users to install hacked versions? If not, why SHA256? MD5 is plenty good enough to verify a clean download, isn't it?
     
  2. Triple Helix

    Triple Helix Specialist

    Joined:
    Nov 20, 2004
    Posts:
    13,275
    Location:
    Ontario, Canada
    Google is your best friend!
     
  3. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    It only takes a few wingnuts.

    Something on this from an Ubuntu link:

    https://help.ubuntu.com/community/HowToSHA256SUM

    I guess in a nutshell: SHA-256 is more secure than MD5
     
  4. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    Remember that Linux is not only used by home users, but it is also used by companies, government, researchers etc Linux home users may not be a target, but there are other targets hunted by nation-state groups .

    And ultimately why settle for something much worse when you can get something better?
     
  5. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    1,934
    Location:
    North of the 38th parallel.
    No! When a hash function is proven to be insecure, by mathematical flaw, it is our responsibility to upgrade our practices and show others we are careful and we care about security. All hash functions between MD2 & SHA-1 (inclusive) have been adequately proven to have mathematical flaws.

    I sincerely hope that noteworthy organizations such as the Google owned Virus Total will discontinue the practice of using MD5/SHA-1 in their searches and analysis reports.

    It is most unfortunate that all necessary software/hardware upgrades have not been taken to make SHA-3 an everyday tool for IT. Pity...

    Yes - many still use MD5 as a cataloging tool. That isolated special use is certainly debatable.

    Respectfully
     
  6. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    890
    Location:
    The Netherlands
    Last edited: Jan 19, 2022
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.