answersLogoWhite

0

Advantages of Secure hash algorithm

Updated: 10/19/2022
User Avatar

Wiki User

11y ago

Best Answer

because it is more secure than any other algorithm.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Advantages of Secure hash algorithm
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the best way of referring to the output of a secure hash function?

The output from a hash function is referred to as the hash value, hash code, hash sum, checksum or just plain "hash" as in "the hash of the file is...". Generally a hash function is presumed to be secure or it wouldn't be used. If a hash is not secure it could be referred to as "worthless" or "false sense of security".


What is the difference between AES Rijndael symmetric algorithm encryption and a hash algorithm?

678


Which hash algorithm creates a 128-bit digest?

MD5


What hash algorithm is used by common implementaions of Chap?

MD5


Which hash algorithm is commonly used in networking protocols and systems?

SHA-1


Which hash algorithm is a 160 bit hash value?

Some well-known hash algorithms with a 160-bit output:RIPEMMD-160SHA-0/SHA-1Tiger-160


Which is more secure an LM hash or an NTLM hash?

NTLM Hash is more secure than LM Hash. It was actually replaced by Windows with NTLM. NTLM is case sensitive; so it matters how passwords are typed, its character set is 65,535, and it does not limit stored passwords to two 7- character parts. NTLM is considered a much stronger hashing algorithm. Just make sure passwords stored are more than 14 characters and you will be fine. Now Unix and Linux are probably a more stable OS because they use "salt" Windows LM and NTLM does not.


Which two algorithm are used for hash encoding to guarantee the ingerity of data?

MD5 and SHA


What makes fasta faster than needleman wunsch algorithm?

Hash loookup table in FASTA makes it faster than Needleman Wunsch algorithm.


Which common hash algorithm is a 160 bit hash value?

Both SHA-1 and SHA-0 use a 160-bit hash value. Note that "SHA-0" is a retronym for the original SHA hash algorithm. SHA-1 corrected some significant flaws in the original algorithm that yielded some serious security weakness. The TIGER hash algorithm is designed to use a 192-bit hash, but also has the capability to use 160-bit and 128-bit hash values. The HAVAL algorithm can produce hashes in lengths of 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits. One version of the RIPEMD algorithm, RIPEMD-160, has a 160-bit hash. Other versions of RIPEMD, RIPEMD-128, RIPEMD-256, and RIPEMD-320, use 128, 256, and 320-bit hashes respectively. Of these, the most common is probably SHA-1, which is available on most Windows based machines.


What is a mathematical formula that generates a code from the contents of a message?

hash, cypher, algorithm, private key


Which algorithm is least secure ntlm or lanman?

LANMAN