SHA-1 is neither a protocol, nor is it an encryption standard, it is a hash functions. Hash functions do not provide confidentiality, they can only provide message integrity and if you use it as a keyed hash it can provide authentication.
see:
http://www.rsasecurity.com/rsalabs/faq/3-6-5.html
Use 3DES to get confidentiality.
On Tue, 2002-07-09 at 11:41, Randy Williams wrote:
> >From what I've seen and heard, SHA-1 is a slightly more robust protocol, but
> opinions do vary.
>
> Thanks,
>
> Randy Williams
> Systems Support Analyst
> Tech Source Inc.
> 407.262.7100
> ----- Original Message -----
> From: "Mario Behring" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Monday, July 08, 2002 3:56 PM
> Subject: 3DES versus SHA-1
>
>
> > Hi all,
> >
> > The purpose is to transfer data between sites securely using emails, HTTP,
> > FTP, IP (LAN/WAN), etc.
> >
> > Which algorithm should I use: 3DES or SHA-1 ?
> >
> > Thanks.
> >
> > Mario
> >
> > __________________________________________________
> > Do You Yahoo!?
> > Sign up for SBC Yahoo! Dial - First Month Free
> > http://sbc.yahoo.com
> >
--
Chris Field
[EMAIL PROTECTED]
Affinity Solutions Inc.
386 Park Avenue South
Suite 1209
New York, NY 10016
(212) 685-8748 ext. 32
signature.asc
Description: This is a digitally signed message part
