Hash Type

Encryption Method for Web Programming.

Encryption is a process to secure the information by making the information can not be read without the aid of special.
Advantage of the encryption code is the original we can not be read by other people.
Here are some kinds of encryption methods that can be used on your website programming such as PHP, ASP and more.

0000 CRC-16-CCITT
d/OCGWXA1TbJc DES(Unix)
be6bc64c94bbc062bcebfb40b4f93304 Domain Cached Credentials
ce85b99cc46752fffee35cab9a7b0278abb4c2d2055cff685af4912c49490f8d GOST R34.11-94

1. Encryption Method MD2
Message-Digest algortihm 2 (MD2) is a cryptographic hash function developed by Ronald Rivest in 1989.
Algorithm optimized for 8-bit computer. MD2 is defined in RFC 1319.
Although other algorithms have been proposed since first, such as MD4, MD5 and SHA, even up to 2004 [update] MD2 still used in public key infrastructures as part of a certificate generated with MD2 and the RSA

example:
MySQL
60671c896665c3fa MySQL 16 characters
667f407de7c6ad07358fa38daed7828a72014b4e MySQL5 40 characters

2. Encryption Method MD4
Message-Digest algortihm 4 (tie 4th), designed by Professor Ronald Rivest of MIT in 1990.
Length is 128 bits.
MD4 was also used to calculate the summary NT-hash password in Microsoft Windows NT, XP and Vista.

example:
MD4
bde52cb31de33e46245e05fbdbd6fb24 MD4 32 characters
a0f0057303393f643a09d7db430b9fe1 MD4 (HMAC*) 32 characters
veUssx3jPkYkXgX729b7JA==Z7g= MD4 (Base64*) 28 characters

3. MD5 Encryption Method
MD5 is one of a series of message digest our algorithm designed by Professor Ronald Rivest of MIT (Rivest, 1994).
While analytical work indicates that the precursor MD5 is not secure MD4 start, MD5 and designed in 1991 as a replacement of MD4 (MD4 weaknesses found by Hans Dobbertin).
In cryptography, MD5 (Message-Digest algortihm 5) hash function is kriptografik widely used hash value with a 128-bit.
On the Internet standard (RFC 1321), MD5 has been used in various applications in the security, and MD5 is also commonly used to perform the test the integrity of a file.


example:
0cc175b9c0f1b6a831c399e269772661 MD5 32 characters
3673438f11d71c21a9b8b59232a3dd61 MD5 (HMAC) 32 characters
DMF1ucDxtqgxw5niaXcmYQ==Z7g= MD5 (Base64) 28 characters
$1$$Ij31LCAysPM23KuPlm1wA/ MD5 (Unix) 26 characters
$apr1$$ny0TwGBt5/BPT4.mbWBKk. MD5 (APR) 29 characters

4. SHA Encryption Method
SHA is a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by NIST as a U.S. Federal Information Processing Standard.
SHA is the Secure Hash Algorithm. Types, namely SHA SHA-0, SHA-1, and SHA-2.
To use the SHA-2 algorithm is identical to the size of the summary variable that is known as SHA-224, SHA-256, SHA-384, and SHA-512.

example:
7f984109f39759f3f41dba04f5183741e36f1445 Sha-1 (HMAC) 40 characters
hvfkN/qlp/zhXR3cuerq6jd2Z7g= Sha-1 (Base64) 28 characters

5. RC4 Encryption Method
RC4 is a stream cipher type of process unit or input data at a time. Units or, in general, a data byte or even a bit sometimes (in the case of RC4 bytes).
In this way the encryption or decryption can be carried out on a long variable.
It is the RC4 stream cipher created by Ron Riverst in 1987 for the security of RSA.
Algoritmanya based on a random permutation

6. Base64 Encryption Method
Base64 is a system to represent the raw data bytes as ASCII characters.
Base64 provides 6-bit encoding 8-bit ASCII characters.
Base64 is a format that uses printable characters, binari allows data to be sent in the form and email, and will be stored in a database or file.








Komentar

Postingan populer dari blog ini

VOTE KOMODO TO SAVE THE WORLD (Commit to Conservation)

Mafia War Guide - How to Dominate Mafia Wars