Good answer ! :-)

On Mar 11, 6:01 am, Benj Nunez <[email protected]> wrote:
> "And what I want to know how to choose an algorithm. You know
> something
> like weakeness comparison and known attacks. "
>
> This link might help you:
>
> http://en.wikipedia.org/wiki/Cryptographic_hash_function
>
> There is an outline of a list of hash functions (complete with links)
> at the bottom
> of the page. For known weaknesses, these are mentioned under the
> "Security" heading.
>
> Cheers!
>
> Benj
>

Reply via email to