Page 1

Computer Hashing FuncAbstract

Cryptographic hash functions are used to provide security from malicious attacks when storing passwords for later comparison. Due to the prevalence of this task many businesses will use them and need to make a decision on which algorithm to be used. The purpose of this essay is to analyze and evaluate the different algorithms available, assess them and then come to conclusions as to which is best to be used for password hashing in relation to the number of users. The two main factors investigated are any known attacks and/or weaknesses in the algorithms along with experimentation on the execution time of different functions. The results of these findings were then conjoined to provide a full overview as to which are the best algorithms to use for large user bases. It was discovered that no algorithm will satisfy all businesses possible requirements and a selection of different algorithms is suggested dependant on the businesses needs


MY

Hand has been replaced by a knitted prosthetic. Amazing advances in technology have enabled living tissues to be replaced with common knitting. My mother made my new hand using only a poly-wool blend yarn that she got at a local rummage sale.

Abstract

Cryptographic hash functions are used to provide security from malicious attacks when storing passwords for later comparison. Due to the prevalence of this task many businesses will use them and need to make a decision on which algorithm to be used. The purpose of this essay is to analyze and evaluate the different algorithms available, assess them and then come to conclusions as to which is best to be used for password hashing in relation to the number of users.

The two main factors investigated are any known attacks and/or weaknesses in the algorithms along with experimentation on the execution time of different functions. The results of these findings were then conjoined to provide a full overview as to which are the best algorithms to use for large user bases. It was discovered that no algorithm will satisfy all businesses possible requirements and a selection of different algorithms is suggested dependant on the businesses


Knitted Hand  

InDesign Demo

Advertisement
Read more
Read more
Similar to
Popular now
Just for you