In former blog entries we have talked about what encryption, encoding, and hashing are and what you possibly might need checksums and hashes for. The names of several algorithms and ciphers that can be used for creating hashes or processing encryption have been mentioned as well, yet, which system should be used for which purpose?
This is the purpose of this article. Let’s have a look at different kinds of hashing and encryption ciphers you can use to produce checksums.… Read the rest