Click here to Skip to main content
12,697,178 members (26,421 online)
Rate this:
 
Please Sign up or sign in to vote.
Which is the favored hashing technique to use with digital signature algorithms

or

Which is the best hashing technique other than SHA-256 & SHA-512 and please tell why?
Posted 4-Oct-12 20:08pm
Updated 4-Oct-12 21:40pm
TorstenH.34.9K
v3
Comments
TorstenH. 5-Oct-12 2:41am
   
Added some tags, this is not really a Java Question.

1 solution

Rate this: bad
 
good
Please Sign up or sign in to vote.

Solution 1

There is no "Best", it is down to how you want to apply the crypto hash, data criticality, data range, computational cost etc. etc.

Have a read of the various hash comparisons here; http://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_functions[^]

Maybe edit your question with what exactly you are trying to do, and maybe someone will recommend what they would use.
  Permalink  

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

  Print Answers RSS
Top Experts
Last 24hrsThis month


Advertise | Privacy | Mobile
Web01 | 2.8.170118.1 | Last Updated 5 Oct 2012
Copyright © CodeProject, 1999-2017
All Rights Reserved. Terms of Service
Layout: fixed | fluid

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100