Article

Hashing of Message

arrow_icon

Ladislav Schwartz, Dusan Trstensky

arrow_icon

DOI:

Abstract

For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing. Hashing is used at safe put passwords, decode keys, authentication and electronic signature. Important is its one way and resistance for collisions. Most safety are standarts for hashing SHA-1 and RIPEMD-160.

Full Text:

PDF

Cite this