My understanding is that 3DES is best used for bulk data encryption
applications such as those listed below when confidentiality is required,
while SHA-1 is a hashing algoritm best employed when applications require
data integrity assurance and data origin authentication.  SHA-1 produces a
160-bit output called a message digest which is then input into Digetal
Signature Algoritm (DSA) which generates or verifies the signature of the
message.  The same hash algorithm must be used by the verifier of a digital
signature as was used by the creator of the digital signature.

Frank
------- Original Message --------
From: "Randy Williams"
To: "[EMAIL PROTECTED]"
CC:
Subject: Re: 3DES versus SHA-1
Date: 09/07/02

>From what I've seen and heard, SHA-1 is a slightly more robust protocol, but
opinions do vary.

Thanks,

Randy Williams
Systems Support Analyst
Tech Source Inc.
407.262.7100
----- Original Message -----
From: "Mario Behring"
To:
Sent: Monday, July 08, 2002 3:56 PM
Subject: 3DES versus SHA-1


> Hi all,
>
> The purpose is to transfer data between sites securely using emails, HTTP,
> FTP, IP (LAN/WAN), etc.
>
> Which algorithm should I use: 3DES or SHA-1 ?
>
> Thanks.
>
> Mario
>
> __________________________________________________
> Do You Yahoo!?
> Sign up for SBC Yahoo! Dial - First Month Free
> http://sbc.yahoo.com
>

_____________________________________________________________________
This mail was sent by Cablespeed Webmail

Reply via email to