Glad to help!  :)

On Mar 11, 5:21 pm, Cerebrus <[email protected]> wrote:
> Good answer ! :-)
>
> On Mar 11, 6:01 am, Benj Nunez <[email protected]> wrote:
>
> > "And what I want to know how to choose an algorithm. You know
> > something
> > like weakeness comparison and known attacks. "
>
> > This link might help you:
>
> >http://en.wikipedia.org/wiki/Cryptographic_hash_function
>
> > There is an outline of a list of hash functions (complete with links)
> > at the bottom
> > of the page. For known weaknesses, these are mentioned under the
> > "Security" heading.
>
> > Cheers!
>
> > Benj

Reply via email to