View Single Post
11-29-2007, 02:04 AM
La Vida es Sueño
Join Date: Sep 2007
Originally Posted by
Of the methods shown, SHA1 is the only one I'd accept to perform a hash on non-critical data.
Are you saying SHA1 is insecure? And if so, based on what? I was under the impression that SHA1, like MD5, is irreversible. However, SHA1, again like MD5, is susceptible to methods such as rainbow tables and thus apart from their speed and length, are inseperable.
The man who comes back through the Door in the Wall will never be quite the same as the man who went out.
View Public Profile
Send a private message to Wildhoney
Visit Wildhoney's homepage!
Find More Posts by Wildhoney