Click here to Skip to main content
Rate this: bad
good
Please Sign up or sign in to vote.
See more: Java cryptography math , +
Which is the favored hashing technique to use with digital signature algorithms
 
or
 
Which is the best hashing technique other than SHA-256 & SHA-512 and please tell why?
Posted 4-Oct-12 19:08pm
Edited 4-Oct-12 20:40pm
TorstenH.32.7K
v3
Comments
TorstenH. at 5-Oct-12 2:41am
   
Added some tags, this is not really a Java Question.

1 solution

Rate this: bad
good
Please Sign up or sign in to vote.

Solution 1

There is no "Best", it is down to how you want to apply the crypto hash, data criticality, data range, computational cost etc. etc.
 
Have a read of the various hash comparisons here; http://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_functions[^]
 
Maybe edit your question with what exactly you are trying to do, and maybe someone will recommend what they would use.
  Permalink  

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

  Print Answers RSS
0 Sarvesh Kumar Gupta 228
1 CHill60 200
2 DamithSL 153
3 OriginalGriff 138
4 Sergey Alexandrovich Kryukov 133


Advertise | Privacy | Mobile
Web04 | 2.8.140709.1 | Last Updated 5 Oct 2012
Copyright © CodeProject, 1999-2014
All Rights Reserved. Terms of Service
Layout: fixed | fluid