Mar 10, 2012

Tips Bloging - Encryption Methods for Web Programming

Encryption is that the method of securing info the information the data} by creating such information can't be browse while not the assistance of specialised knowledge.
The advantage of encryption is that the original code we are able to not be browse by others.
Here there are many forms of encryption strategies will be used on web site programming like PHP, ASP and others.

A. MD2 encryption methodology

Algortihm Message-Digest a pair of (MD2) could be a cryptographic hash perform developed by Ronald Rivest in 1989.
Algorithms optimized for 8-bit computers. MD2 is per RFC 1319.
Although different algorithms are proposed within the past, like MD4, MD5 and SHA, even up to 2004 [update] MD2 still utilized in public key infrastructure as a part of the certificate generated with MD2 and therefore the RSA.

B. Encryption strategies MD4

Message-Digest algortihm four (4th series) designed by Professor Ronald Rivest of MIT in 1990.
Its length is 128 bits.
MD4 is additionally used to calculate outline NT-hash the password in Microsoft Windows NT, XP and Vista.

C. MD5 encryption methodology

MD5 is one among a series of message digest algorithms designed by Professor Ronald Rivest of MIT (Rivest, 1994).
When analytic work indicated that MD5's predecessor MD4 is to be insecure, MD5 was designed in 1991 because the successor of MD4 (MD4 weaknesses found by Hans Dobbertin).
In cryptography, MD5 (Message-Digest algortihm 5) could be a cryptographic hash perform is employed extensively with 128-bit hash worth.
On the net normal (RFC 1321), MD5 has been utilised in a very kind of security applications, and MD5 are commonly used for testing the integrity of a file.

D. SHA encryption methodology

SHA could be a set of cryptographic hash functions designed by the National Security Agency (NSA) and printed by NIST as a U.S. Federal info Processing normal.
SHA is that the Secure Hash Algorithm. the kinds of the SHA SHA-0, SHA-1, and SHA-2.
For SHA-2 algorithms are clone of the outline live of well-known variables as SHA-224, SHA-256, SHA-384, and SHA-512.

E. RC4 encryption methodology

RC4 is one sort of stream cipher, the processing unit or input information at just once. Unit or a byte of knowledge normally or typically even alittle (byte in RC4).
In this method encryption or decryption will be performed on a variable length.
RC4 is an encryption stream cipher created by Ron Riverst in 1987 for RSA Security.
The algorithm relies on random permutations.

F. Base64 Encryption strategies

Base64 could be a system to represent the raw information bytes as ASCII characters.
Base64 provides 6-bit encoding 8-bit ASCII characters.
Base64 could be a printed format using characters, permitting binary information to be transmitted within the kind and email, and can be stored in a very database or file.
Description: Tips Bloging - Encryption Methods for Web Programming Rating: 4.5 Reviewer: Lala Khasanah ItemReviewed: Tips Bloging - Encryption Methods for Web Programming

Posted by: Lala Khasanah
Khazanah Blog, Updated at: 1:48 PM
◄ Newer Post Older Post ►
 

Copyright 2011 Khazanah Blog is proudly powered by blogger.com | Design by Tutorial Blogspot Published by Template Blogger