"And what I want to know how to choose an algorithm. You know
something
like weakeness comparison and known attacks. "


This link might help you:

http://en.wikipedia.org/wiki/Cryptographic_hash_function


There is an outline of a list of hash functions (complete with links)
at the bottom
of the page. For known weaknesses, these are mentioned under the
"Security" heading.



Cheers!


Benj




On Mar 10, 4:30 am, Theraot <[email protected]> wrote:
> Hello,
>
> I need a MAC (Message authentication code) for files, this codes uses
> to be a Hash (SHA, MD...) or a CRC. what I want to know here is what
> things I need to take in account to choose one or another MAC.
>
> Please note that googling MAC brings up pages about Macintosh,
> googling authentication brings up pages about user authentication.
> googling hash CRC brings up info about specific algorithms (straight
> to implementation).
>
> And what I want to know how to choose an algorithm. You know something
> like weakeness comparison and known attacks.
>
> I hope you can help with some material on the matter.
> Thanks.

Reply via email to