Click here to Skip to main content
11,705,451 members (62,958 online)
Rate this: bad
good
Please Sign up or sign in to vote.
See more: Java cryptography math , +
Which is the favored hashing technique to use with digital signature algorithms

or

Which is the best hashing technique other than SHA-256 & SHA-512 and please tell why?
Posted 4-Oct-12 19:08pm
Edited 4-Oct-12 20:40pm
TorstenH.34.8K
v3
Comments
TorstenH. at 5-Oct-12 2:41am
   
Added some tags, this is not really a Java Question.

1 solution

Rate this: bad
good
Please Sign up or sign in to vote.

Solution 1

There is no "Best", it is down to how you want to apply the crypto hash, data criticality, data range, computational cost etc. etc.

Have a read of the various hash comparisons here; http://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_functions[^]

Maybe edit your question with what exactly you are trying to do, and maybe someone will recommend what they would use.
  Permalink  

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

  Print Answers RSS
0 Sergey Alexandrovich Kryukov 500
1 OriginalGriff 269
2 CPallini 82
3 ppolymorphe 68
4 Inimicos 60
0 OriginalGriff 9,053
1 Sergey Alexandrovich Kryukov 8,347
2 CPallini 5,189
3 Maciej Los 4,726
4 Mika Wendelius 3,626


Advertise | Privacy | Mobile
Web03 | 2.8.150819.1 | Last Updated 5 Oct 2012
Copyright © CodeProject, 1999-2015
All Rights Reserved. Terms of Service
Layout: fixed | fluid

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100