klotz: encryption*

0 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. 2020-04-27 Tags: , , , , , by klotz
  2. 2020-02-22 Tags: , , , by klotz
  3. 2019-07-10 Tags: , , , , , , by klotz
  4. 2019-07-10 Tags: , , , , by klotz
  5. 2019-03-11 Tags: , , , , by klotz
  6. It has been shown that cyclic redundancy checks with
    known generator polynomials should not be used to verify
    the integrity when someone can alter the data between its
    source and destination and can obtain the original CRC
    values. Two solutions are to keep the polynomial used to
    create the CRC secret 9 » or to incorporate some secret
    value into the CRC that is unknown to the adversary as in
    HMAC-SHA1 or HMAC-MD5 10 » . A hash function
    such as MD5 or SHA1 may be a better choice to verify
    integrity of data. One-way hashes are mathematical
    functions that produce a relatively unique value for a
    particular message.
    2018-10-22 Tags: , , , , , by klotz
  7. 2018-09-03 Tags: , by klotz
  8. 2017-10-19 Tags: , , , by klotz
  9. 2017-02-27 Tags: , , , , by klotz

Top of the page

First / Previous / Next / Last / Page 1 of 0 SemanticScuttle - klotz.me: Tags: encryption

About - Propulsed by SemanticScuttle