My understanding is that 3DES is best used for bulk data encryption applications such as those listed below when confidentiality is required, while SHA-1 is a hashing algoritm best employed when applications require data integrity assurance and data origin authentication. SHA-1 produces a 160-bit output called a message digest which is then input into Digetal Signature Algoritm (DSA) which generates or verifies the signature of the message. The same hash algorithm must be used by the verifier of a digital signature as was used by the creator of the digital signature.
Frank ------- Original Message -------- From: "Randy Williams" To: "[EMAIL PROTECTED]" CC: Subject: Re: 3DES versus SHA-1 Date: 09/07/02 >From what I've seen and heard, SHA-1 is a slightly more robust protocol, but opinions do vary. Thanks, Randy Williams Systems Support Analyst Tech Source Inc. 407.262.7100 ----- Original Message ----- From: "Mario Behring" To: Sent: Monday, July 08, 2002 3:56 PM Subject: 3DES versus SHA-1 > Hi all, > > The purpose is to transfer data between sites securely using emails, HTTP, > FTP, IP (LAN/WAN), etc. > > Which algorithm should I use: 3DES or SHA-1 ? > > Thanks. > > Mario > > __________________________________________________ > Do You Yahoo!? > Sign up for SBC Yahoo! Dial - First Month Free > http://sbc.yahoo.com > _____________________________________________________________________ This mail was sent by Cablespeed Webmail