Cryptographic Hashing Function (SHA-1 and MD5): Difference between revisions
Jump to navigation
Jump to search
(Created page with '==Differences between Cryptographic Hashing Functions== A crytographic hashing function is a deterministic procedure that takes a block of code and returns a fixed bit string. T…') |
No edit summary |
||
Line 5: | Line 5: | ||
==SHA-1== | ==SHA-1== | ||
SHA-1 was designed by the Nation Security Agency (NSA) in 1995. | |||
Published by The National Institute of Standards and Technology as a Federal Information Processing Standard for the US. | |||
==Refrences== | |||
[http://en.wikipedia.org/wiki/SHA1 SHA-1 Wiki] |
Revision as of 21:33, 8 December 2010
Differences between Cryptographic Hashing Functions
A crytographic hashing function is a deterministic procedure that takes a block of code and returns a fixed bit string.
Two widely used hasing functions used today are MD5 and SHA-1
SHA-1
SHA-1 was designed by the Nation Security Agency (NSA) in 1995.
Published by The National Institute of Standards and Technology as a Federal Information Processing Standard for the US.