Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. C#
  4. c# cryptography hashing functions

c# cryptography hashing functions

Scheduled Pinned Locked Moved C#
csharpdatabasequestion
3 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H Offline
    H Offline
    honeyman_can
    wrote on last edited by
    #1

    How secure are these algorithms for cryptography? Can you use these functions for commercial applications or would one need to create your own cryptography hashing function? I want to use one of these cryptography functions to prove that the DB's data has not been tampered with. So on my side the hashing number would be stored as well some 3rd party to show that the two hashing numbers are equal. MD5CryptoServiceProvider SHA1CryptoServiceProvider SHA384Managed Thanks

    E M 2 Replies Last reply
    0
    • H honeyman_can

      How secure are these algorithms for cryptography? Can you use these functions for commercial applications or would one need to create your own cryptography hashing function? I want to use one of these cryptography functions to prove that the DB's data has not been tampered with. So on my side the hashing number would be stored as well some 3rd party to show that the two hashing numbers are equal. MD5CryptoServiceProvider SHA1CryptoServiceProvider SHA384Managed Thanks

      E Offline
      E Offline
      Ed Poore
      wrote on last edited by
      #2

      Well, if they're supposed to comply with standards then they are as secure as the algorithms themselves.  As far as I know MD5 is considered insecure and I think that SHA384 is more secure than SHA1. Take a look at the following article: http://en.wikipedia.org/wiki/Cryptographic_hash_function[^]


      The Welsh will always support two teams: The Welsh, and anyone playing England :)

      1 Reply Last reply
      0
      • H honeyman_can

        How secure are these algorithms for cryptography? Can you use these functions for commercial applications or would one need to create your own cryptography hashing function? I want to use one of these cryptography functions to prove that the DB's data has not been tampered with. So on my side the hashing number would be stored as well some 3rd party to show that the two hashing numbers are equal. MD5CryptoServiceProvider SHA1CryptoServiceProvider SHA384Managed Thanks

        M Offline
        M Offline
        mav northwind
        wrote on last edited by
        #3

        If you're asking how secure these standard algorithms are then you should in any case restrain from creating your own algorithm! If you don't even know the standards, I'm pretty sure everything you can come up with will be a lot weaker than what cryptography specialists have created.

        Regards, mav -- Black holes are the places where god divided by 0...

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups