SHA-1 is neither a protocol, nor is it an encryption standard, it is a hash functions. Hash functions do not provide confidentiality, they can only provide message integrity and if you use it as a keyed hash it can provide authentication.
see: http://www.rsasecurity.com/rsalabs/faq/3-6-5.html Use 3DES to get confidentiality. On Tue, 2002-07-09 at 11:41, Randy Williams wrote: > >From what I've seen and heard, SHA-1 is a slightly more robust protocol, but > opinions do vary. > > Thanks, > > Randy Williams > Systems Support Analyst > Tech Source Inc. > 407.262.7100 > ----- Original Message ----- > From: "Mario Behring" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Monday, July 08, 2002 3:56 PM > Subject: 3DES versus SHA-1 > > > > Hi all, > > > > The purpose is to transfer data between sites securely using emails, HTTP, > > FTP, IP (LAN/WAN), etc. > > > > Which algorithm should I use: 3DES or SHA-1 ? > > > > Thanks. > > > > Mario > > > > __________________________________________________ > > Do You Yahoo!? > > Sign up for SBC Yahoo! Dial - First Month Free > > http://sbc.yahoo.com > > -- Chris Field [EMAIL PROTECTED] Affinity Solutions Inc. 386 Park Avenue South Suite 1209 New York, NY 10016 (212) 685-8748 ext. 32
signature.asc
Description: This is a digitally signed message part