6.1, MD5
- It is recommended to use CC (i.e. Commons Codec) for
- Although it has been cracked, it is still widely used to register login modules and verify the integrity of downloaded files
- You can write a registered login module yourself, download a MD5 encrypted file yourself, and then verify it by using the tool class (or the CC method) you previously wrote (for example, in Java Encryption and decryption Art (second edition))
6.2. SHA
- It is recommended to use CC (i.e. Commons Codec) for
- SHA1 has been cracked, SHA256 is widely used to register login modules and verify the integrity of downloaded files, and SHA256 is also useful in spring security
- You can write a registered login module yourself, download a SHA Encrypted file yourself, and then verify it by using the tool class (or the CC method) you wrote earlier
- MD5 and Sha are often used as signature algorithms for digital certificates (which can be said later), but Sha is more common
6.3. MAC
- The addition of keys to the MD and SHA series algorithms makes the security level the best of three methods
The sixth chapter three big message Summary algorithm summary