1
What is and what is done with each of these SHA-1, SHA-256, HASH, MD5 on a day to day basis?
1
What is and what is done with each of these SHA-1, SHA-256, HASH, MD5 on a day to day basis?
Browser other questions tagged java terminology hash
You are not signed in. Login or sign up in order to post.
Are algorithms of hash.
– Jéf Bueno
Related: How to hash passwords securely? — It is efficient to check file modifications by Hash? — The MD5 hash can repeat for different passwords causing collision? — What is and what is a checksum for?
– Jéf Bueno
Related or duplicate: What is the difference between coding, encryption and hash calculation?
– Jéf Bueno
Related or duplicate: How the SHA family hash algorithms work?
– Jéf Bueno
hello, I’m reading all the links, thank you very much, please, what is the hash relationship with Base64?
– user97933
@Douglasmaogrande A hash is typically a chaotic-looking byte sequence. If you try to treat it as a string, it may have non-printable characters, invisible characters and characters that were not mapped in the Unicode pattern. Therefore, Base64 or hexadecimal is used to leave it in a uniform and simple format where all characters are printable and within a well delimited set.
– Victor Stafusa
After reading all the comments it was clear that to protect the password the best is Bencript, right ? Please, which library use it? Not in java, ne?
– user97933
@DouglasMaogrande https://howtodoinjava.com/security/how-to-generate-secure-password-hash-md5-sha-pbkdf2-bcrypt-examples/
– Victor Stafusa
Victor, thank you so much for your great help... Could you tell me what Unicode and hexadecimal is, please?
– user97933