The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。
The padding is terminated by a "00" byte. It's followed by "30 21 30 09 06 05 2B 0E 03 02 1A 05 00 04 14" which is the PKCS #1 v2.1 way of specifying the SHA-1 hash algorithm.
填充字节以“00”结束,后面跟的是"3021 300906052B0E03021A 05 000414",PKCS #1v2.就是这样来指定SHA-1哈希算法。
The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.
hashcash提出质询的方式是,当通过安全散列算法(SecureHash Algorithm)进行散列时,要求“minters”生成 一个字符串(戳记,stamps),在它们的散列中有很多前导零。
Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.
今天谷歌破解了一种名为SHA-1的老式加密算法,尽管此事听起来不像是网络安全界最重大的里程碑。
Google still believes that its research should encourage all companies that are still using this algorithm to stay away from SHA-1, which has long been considered to be very secure.
谷歌仍然认为其研究应该会促使仍在使用这种算法的所有公司远离长期以来被认为安全性很差的SHA - 1。
However, in the case of the use of SHA-1, such as the existence of certain defects in the hash algorithm, with abundant resources of the attacker is able to achieve this kind of collision results.
然而,在使用SHA - 1等存在一定缺陷的散列算法的情况下,拥有充裕资源的攻击者确实能够实现这种碰撞结果。
By making an overall analysis, an efficient hardware architecture is proposed to speed up the SHA-1 algorithm.
通过对SHA - 1算法进行深入分析,提出了一种快速实现此算法的硬件方案。
Then a detailed ASIC design of the SHA-1 algorithm module is given, whose logic on the longest critical path is optimized.
随后给出了SHA - 1算法模块的详细ASIC设计,优化了SHA - 1模块最长关键路径上的逻辑结构。
It USES SHA-1 algorithm to reliably determine if files are identical.
它采用SHA - 1算法能够可靠地确定文件是相同的。
It USES SHA-1 algorithm to reliably determine if files are identical.
它采用SHA - 1算法能够可靠地确定文件是相同的。
应用推荐