1 Matching Annotations
- Sep 2024
-
www.dpconline.org www.dpconline.org
-
MD5 is only suitable for detecting accidental data corruption and not for data security applications.Strong cryptographic hash algorithms such as SHA256 and SHA512 can be used for both datasecurity and data safety. This makes SHA256 and SHA512 more universally usable – but at theexpense of being more computationally expensive to calculate and somewhat less widely supportedby some tools (esp. SHA512).
To my suprise, not always true due to the amount of effort that has gone into optimising some SHA implementations.
-