sha1 – POFTUT

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list … Read more

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to authenticate. Message is checked against … Read more

What Is OpenSSL Library?

OpenSSL is most popular open source cryptography library which provides a lot of tools, libraries, algorithms about cryptography. It is mostly known with Secure Socket Layers (SSL) and Transport Layer Security (TLS) protocols. Supported Encryption Algorithms Encryption is used to make given data unreadable by the intruders. It is mainly used for confidentiality. OpenSSL supports … Read more

Python Hash Strings and Lists to MD5, SHA256, SHA512 with Hashlib Module

Security is important part of the today IT and gains more respect from IT world. Hashing is a security measure to protect and check our data. In this tutorial we will look how to use hash with tables and strings. What is Hash Hash is a function where provided data will be converted into another … Read more

How To Check Integrity Of Files In Linux?

In today IT world everything connected and a lot of data is being downloaded from the internet or over networks. This may create some minor problems. The data downloaded may be corrupted or there may be some intruders in network and with the man of the middle attack may change our files. There are different … Read more