github twitter email rss
Cryptography
0001 Jun 1
One minute read

Cryptography

Hash types:

Adler-32, CRC, FNV, Murmur2, PJW-32, TTH, Jenkins hash, HAVAL, Keccak, LM-хеш, MD2, MD4, MD5, MD6, N-Hash, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, SHA-1, SHA-2, Skein, Snefru, Tiger, Whirlpool, ГОСТ Р 34.11-94

Example

sha256

d3d0f475330dcc376cd9d80f08a0e0270c6f1de0e3ee39cf71925b5cfdcf96f9

sha1

30ad1cdf5d0670f12788005131e24862f6ab8aab

block cipher

  • Blowfish
  • Twofish

http://en.wikipedia.org/wiki/One-time_pad

hash function
hash key
public key(verification key), private key(signing key)
digital signature
digest
transaction

Cryptography law

http://en.wikipedia.org/wiki/Illegal_number


Back to posts


comments powered by Disqus