1
1

Use Action security/hash and select the algorithm “sha”

SHA1 (Secure Hash Algorithm) is a cryptographic hash function designed by the National Security Agency (NSA). SHA1 produces a 160-bit (20-byte) hash value, typically rendered as a hexadecimal number, 40 digits long. SHA1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols. The SHA1 algorithm might not be secure enough for ongoing use. It is recommended not to use SHA1.

  • You must to post comments
0
0

Use Action security/hash and select the algorithm “sha”

SHA1 (Secure Hash Algorithm) is a cryptographic hash function designed by the National Security Agency (NSA). SHA1 produces a 160-bit (20-byte) hash value, typically rendered as a hexadecimal number, 40 digits long. SHA1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols. The SHA1 algorithm might not be secure enough for ongoing use. It is recommended not to use SHA1.

  • You must to post comments
Showing 1 result
Your Answer

Please first to submit.