[quote name='sooner123' timestamp='1303918985' post='4803576']
I actually know very little about the mechanics of the hashing algorithm itself. And I couldn't find much online. I'll keep looking.
If you can't find anything, then you are obviously trolling, because you aren't trying very hard. Wikipedia alone has tons of information as well as pseudocode implementations of both md5, sha-1, and sha-2 (all of which I have used to implement these in C++), along with links to the FIPS or RFC documents which explain the concepts and inner workings of them all.
You have asked several times "Is this infeasible", to which every time the answer has been "Yes, it is infeasible", but it is obviously falling off deaf ears.
[/quote]
Sorry to waste your time then. It was an idea. Nothing more.
(have a lot to learn) != (trolling) imo.
It's hard to know the right places to look and what to look for when you are just getting into this stuff.
Even so, http://en.wikipedia.org/wiki/MD5#Pseudocode is pretty damn cryptic to me.
I won't lie though. All the links and references so far in this thread have taught me a lot.
I'm still not convinced things can't be done the way I'm suggesting. But I can see that MD5 is not the way to do it.