cryptography – POFTUT

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

What Is SHA-256 and How To Calculate SHA-256 In Different Programming Languages?

What Is SHA-256 and How To Calculate SHA-256 In Different Programming Languages?

Hash algorithms are the heart of the cryptography and security. SHA-256 is a Secure Hash Algorithm which will generate an output hash value in 256 bit. SHA-256 is designed by the National Security Agency  (NSA). SHA-256 is one of the cryptographic hash functions. SHA-256 has also named a one-way function where the generated hash value … Read more

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list … Read more

How To Use Curl with HTTPS Protocol and URLS?

Curl is a command line tool and library which implements protocols like HTTP, HTTPS, FTP etc. Curl also supports HTTPS protocol which is secure version of the HTTP. Using curl may create some problems. We will examine how to solve these curl HTTPS related problems. Install Curl We will start with the installation of the … Read more