Any Infos On The Md5 File Format ?

Browser_ICEBrowser_ICE Join Date: 2002-11-04 Member: 6944Members
<div class="IPBDescription">(Doom-3 model file format)</div> I'm just curious, has there been any news about the MD5 file format for Doom-3 models ?

I'm just curious about any developements for a possible export plugin to 3d max, GMAX, ...


I have Doom-3 and I was just thinking how my models would look in it.

Comments

  • WheeeeWheeee Join Date: 2003-02-18 Member: 13713Members, Reinforced - Shadow
    i thought MD5 was a checksum algorithm...
  • DY357LXDY357LX Playing since day 1. Still can&#39;t Comm. England Join Date: 2002-10-27 Member: 1651Members, Constellation
    edited August 2004
    <!--QuoteBegin-Wheeee+Aug 8 2004, 11:42 PM--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> (Wheeee @ Aug 8 2004, 11:42 PM)</td></tr><tr><td id='QUOTE'><!--QuoteEBegin--> i thought MD5 was a checksum algorithm... <!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    Yep, <a href='http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html' target='_blank'>me too</a>.

    There'll be plenty of Doom 3 plug-in's for all the major
    3D applications soon enough. Just give it time and check
    in on those large editing sites / forums.
  • CabooseCaboose title = name(self, handle) Join Date: 2003-02-15 Member: 13597Members, Constellation
    I thought Doom3 used lwo modles?
  • Soylent_greenSoylent_green Join Date: 2002-12-20 Member: 11220Members, Reinforced - Shadow
    edited August 2004
    MD5 is not really a checksum, it's a message digest algorithm. A simple checksum is descent for preventing random errors when transfering files but it provides little security against someone maliciously changing a file, Cyclic Redundancy Checks are even better for ensuring no random changes due to connection errors have occured, but it can still be faked. Changing a file maliciously and retaining the same MD5 checksum is VERY difficult(there's probably no one who can do it currently, the kind of computing power needed with current methods is extreme), the reciever can rest assured that the file has not been tampered with and that no errors during file transfer have occured.
Sign In or Register to comment.