answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What are the differences between Hash algorithms and MD5 and SHA-1?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering
Related questions

Hash function for storing password in c program?

MD5 and SHA1 are quite common.


In what directory should Explorer be located in Windows XP SP2 and how can you tell if it is the real one or malware?

It should be located in the /windows directory. The only truly effective way to determine if it is the real one is to compare the MD5 or SHA1 hash of a valid one to the same hash of the one on your system.


How do you encode sha-1 and base 64?

In PHP, use the sha1 function. For example, to encode the word "hello" into sha1, use sha1("hello");. Similarly, there is a base64_encode function. So you'd use base64_encode("hello");.


The rules for making a hash algorithm are public on the fips website how come someone with access to lets say my sha1 function cant decipher the resulting hash?

Great question - one of the things about hashing is that it is very difficult or impossible to reverse the hashing process, even if you know the algorithm. This is because just doing the steps backwards will not result in the original value.


How do you get rid of Gumblar?

If you suspect that your computer is infected with Gumblar, CHECK: Step 1. Find sqlsodbc.chm in your Windows system folder (by default the location is C:\Windows\System32\). Step 2. Obtain the Sha1 of the installed sqlsodbc.chm. You can use a free tool such as FileAlyzer to obtain the SHA1 of a file. Step 3. Compare the obtained Sha1 with this list, released by Microsoft recently to check for Gumblar attack. Step 4. If your SHA1 along with its size don’t correlate with one pair of the list below it could be a sharp sign of Gumblar infection. You can use our specialized solution against Gumblar – Gumblar Fast Heal.


How do you say 'sauce' in Chinese?

Type your answer here... 酱油 or 沙司 or 调味汁 "jiang4 you2" or"sha1 si1"or"tiao2 wei4 zhi1"


What is the meaning of the acronym SHA1?

Secure hashing algorithm refers to a 2 layer encryption device. This a very rare term and would not be commonly know to anyone not in the computer programming field.


What is the significance of digital imaging in forensics?

Digital imaging is allows for block to block copying of a suspect storage device. Imaging differs from drag & drop copying, in that it makes an identical copy of the drive (to include slack space) instead of just copying the files themselves. A write blocker may be required in some cases to prevent unintentional writing by the OS. Once the original has been imaged at least twice, either an MD5 or SHA1 hash (digital fingerprint) is made to compare it against the images. If they match, then it is trivial for a forensic analyst to prove to the client that the evidence has been unaltered, and anything acquired is identical to what the suspect had on his original drive.


How can you configure an ipsec policy to use only triple des secure hash algorithm version 1 for encryption?

# How to create a customized IPSec policy # Open the IP Security Policy Management console. # Select IP Security Policies. # Right-click the security policy which you want to customize and then click Properties from the shortcut menu. # When the Properties dialog box of the security policy opens, click the Rules tab. # Find the rule which you want to change, and then click the Edit button. # Click the Filter Action tab. # Proceed to customize the filter action. # Click the Security Methods tab. # If you want to create a new security method, click Add. # If you want to remove an existing security method, click Remove. # If you want to change an existing security method, click Edit. # To add a security method, click Custom, and then click Settings. # The Custom Security Method Settings dialog box opens. # To provide data integrity for the IP header and payload, enable the Data and address integrity without encryption (AH) checkbox. Select either the MD5 option or the SHA1 option as the Integrity algorithm. # To provide data integrity and data confidentiality for the IP header and payload, enable the Data integrity and encryption (ESP) checkbox. Select either the MD5 option or the SHA1 option as the Integrity algorithm if you do not have the AH authentication protocol enabled. If you do have the authentication protocol enabled, click the None option. Select either the None option, DES option, or the 3DES option as the Encryption algorithm. # Info found @ http://www.tech-faq.com/configuring-and-managing-ipsec.shtml


How do you stop double logging in using PHP and MySQL?

Assuming you are using a User database and sessions, simply add a Session key. Auto generate this key as follows: $newsession_key = SHA1( RAND(100000000,999999999)); Enter this in the database on the user row when logging in and store it in a session and in the database. Then on your code where you define the user logged in status you add something like: $database_session = $DATABASE['sessionkey']; If($database_session != $_SESSION['sessionkey']){ Unset($_SESSION['username'],$_SESSION['password'],$_SESSION['sessionkey']); #A* } A* Add in any sessions you use to keep the user logged in.


How can you use hackbar?

thisisournet.com This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster. If you want to learn to find security holes, you can also use this toolbar, but you will probably also need a book, a lot of Google and a brain :) # The advantages are: - Even the most complicated urls will be readable - The focus will stay on the textarea, so after executing the url (Ctrl+Enter) you can just go on typing / testing - The url in textarea is not affected by redirects. - I tend to use it as a notepad :) - Useful tools like on the fly uu/url decoding etc. - All functions work on the currently selected text. - MD5/SHA1/SHA256 hashing - MySQL/MS SQL Server/Oracle shortcuts - XSS useful functions - And lots more ;) Go test it! # Shortcuts - Load url ( Alt + A ) - Split url ( Alt + S ) - Execute ( Alt + X, Ctrl + Enter ) - INT -1 ( Alt - ) - INT +1 ( Alt + ) - HEX -1 ( Ctrl Alt - ) - HEX +1 ( Ctrl + Alt + ) - MD5 Hash ( Alt + M ) - MySQL CHAR() ( Alt + Y ) - MS SQL Server CHAR() ( Alt + Q ) See more here: thisisournet.com


What is the encryption method used with wpa2?

WPA2 is capable of using several different encryption types. WPA2 (as opposed to WPA) introduced CCMP, a new AES-based encryption mode. In addition, WPA2 can operate in PSK, also known as Personal mode, which is designed for home and small office networks that don't require the complexity of an 802.1X authentication server. The wireless network device encrypts the network traffic using a 256 bit key. The key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 ASCII characters. If the ASCII characters are used, the 256 bit key is calculated by applying the PBKDF2 key derivation function to the passphrase and using the SSID as the "salt"or initialization parameter and 4096 iterations of HMAC-SHA1.Answers.com