"And what I want to know how to choose an algorithm. You know something like weakeness comparison and known attacks. "
This link might help you: http://en.wikipedia.org/wiki/Cryptographic_hash_function There is an outline of a list of hash functions (complete with links) at the bottom of the page. For known weaknesses, these are mentioned under the "Security" heading. Cheers! Benj On Mar 10, 4:30 am, Theraot <[email protected]> wrote: > Hello, > > I need a MAC (Message authentication code) for files, this codes uses > to be a Hash (SHA, MD...) or a CRC. what I want to know here is what > things I need to take in account to choose one or another MAC. > > Please note that googling MAC brings up pages about Macintosh, > googling authentication brings up pages about user authentication. > googling hash CRC brings up info about specific algorithms (straight > to implementation). > > And what I want to know how to choose an algorithm. You know something > like weakeness comparison and known attacks. > > I hope you can help with some material on the matter. > Thanks.
