Sha - 1 public key cryptography for the financial services industry - part 2 : the secure hash algorithm 金融服務(wù)業(yè)用公共密鑰加密.第2部分:安全散列算式
July 2000 , security expert gary mcgraw explains basics of secure hashing and digital signatures , 2000年7月)中,安全性專(zhuān)家gary mcgraw解釋了安全散列和數(shù)字簽名的基本知識(shí)。
The credential pairs in the example are encrypted using the secure hash algorithm - 1 sha1 password - hashing format 該示例中的憑據(jù)對(duì)是使用安全哈希算法1 ( sha1 )密碼哈希格式加密的。需要
A mask used to retrieve a revision of the secure hash algorithm that corrects an unpublished flaw in sha 用于檢索“安全哈希算法”修訂版的掩碼,該修訂版更正了sha中的一個(gè)未發(fā)布的錯(cuò)誤。
A secure hash algorithm is designed so that it is computationally infeasible to construct a different assembly with the identical hash value by either an accidental or malicious attempt 安全哈希算法的設(shè)計(jì)使以相同的哈希值構(gòu)造不同的程序集在計(jì)算方面是不能實(shí)現(xiàn)的,不管這種嘗試是意外的還是惡意的。