Might be a dumb question
-
Use SHA-256 (SHA-1 has had some flaws suggested), and use the CryptoAPI implementation, or
System.Security.Cryptography
. These implementations have been validated by the US National Institute of Science and Technology. You could also use any other implementation that has been validated[^]. Source code you pick up from the net might well work fine, but I'd be happier using an implementation that has been validated.Stability. What an interesting concept. -- Chris Maunder
Mike Dimmick wrote:
but I'd be happier using an implementation that has been validated
It is very easy to validate the result of a one way hash function. But I'm guessing you mean that the code itself has been deemed robust from a software engineer's point of view.
-- In Hypno-Vision