Good answer ! :-)
On Mar 11, 6:01 am, Benj Nunez <[email protected]> wrote: > "And what I want to know how to choose an algorithm. You know > something > like weakeness comparison and known attacks. " > > This link might help you: > > http://en.wikipedia.org/wiki/Cryptographic_hash_function > > There is an outline of a list of hash functions (complete with links) > at the bottom > of the page. For known weaknesses, these are mentioned under the > "Security" heading. > > Cheers! > > Benj >
