Encryption is the process of securing an information by making such information can not be read without the help of specialized knowledge.
The advantage of encryption is the original code we can not be read by others.
Here are some kinds of encryption methods can be used on websites such as PHP programming, ASP and others.
1. MD2 Encryption Method
Algortihm Message-Digest 2 (MD2) is a cryptographic hash function developed by Ronald Rivest in 1989.
The algorithm is optimized for 8-bit computers. MD2 is defined in RFC 1319.
Although other algorithms have been proposed since the first, such as MD4, MD5 and SHA, even up to 2004 [update] MD2 still used in public key infrastructures as part of the certificate generated with MD2 and the RSA.
2. MD4 encryption method
Message-Digest algortihm 4 (4th series) designed by Professor Ronald Rivest of MIT in 1990.
Its length is 128 bits.
MD4 was also used to calculate summary NT-hash password in Microsoft Windows NT, XP and Vista.
3. MD5 Encryption Method
MD5 is one of a series of message digest algorithms designed by Professor Ronald Rivest of MIT (Rivest, 1994).
As the analytic work shows that MD5's predecessor is not safe from MD4, MD5 and designed in 1991 as a replacement for MD4 (MD4 weaknesses discovered by Hans Dobbertin).
In cryptography, MD5 (Message-Digest algortihm 5) is a cryptographic hash function widely used to hash 128-bit value.
On the Internet standard (RFC 1321), MD5 has been used in a variety of security applications, and MD5 is also commonly used for testing the integrity of a file.
4. SHA Encryption Method
SHA is a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by NIST as a U.S. Federal Information Processing Standard.
SHA is the Secure Hash Algorithm. The types of SHA SHA-0, SHA-1, and SHA-2.
For SHA-2 algorithm is identical to the summary measure of well-known variables as SHA-224, SHA-256, SHA-384, and SHA-512.
5. RC4 Encryption Method
RC4 is one type of stream ciphers, ie processing units or input data at a time. Unit or data in general, a byte or sometimes even a bit (byte in RC4).
In this way the encryption or decryption can be performed on a variable length.
RC4 is a stream cipher encryption made by Ron Riverst in 1987 for RSA Security.
Algorithm based on random permutations.
6. Base64 Encryption Method
Base64 is a system to represent the raw data bytes as ASCII characters.
Base64 provides 6-bit encoding 8-bit ASCII characters.
Base64 is a format that is printed using characters, allowing binary data to be sent in the form and email, and will be stored in databases or files.
The advantage of encryption is the original code we can not be read by others.
Here are some kinds of encryption methods can be used on websites such as PHP programming, ASP and others.
1. MD2 Encryption Method
Algortihm Message-Digest 2 (MD2) is a cryptographic hash function developed by Ronald Rivest in 1989.
The algorithm is optimized for 8-bit computers. MD2 is defined in RFC 1319.
Although other algorithms have been proposed since the first, such as MD4, MD5 and SHA, even up to 2004 [update] MD2 still used in public key infrastructures as part of the certificate generated with MD2 and the RSA.
2. MD4 encryption method
Message-Digest algortihm 4 (4th series) designed by Professor Ronald Rivest of MIT in 1990.
Its length is 128 bits.
MD4 was also used to calculate summary NT-hash password in Microsoft Windows NT, XP and Vista.
3. MD5 Encryption Method
MD5 is one of a series of message digest algorithms designed by Professor Ronald Rivest of MIT (Rivest, 1994).
As the analytic work shows that MD5's predecessor is not safe from MD4, MD5 and designed in 1991 as a replacement for MD4 (MD4 weaknesses discovered by Hans Dobbertin).
In cryptography, MD5 (Message-Digest algortihm 5) is a cryptographic hash function widely used to hash 128-bit value.
On the Internet standard (RFC 1321), MD5 has been used in a variety of security applications, and MD5 is also commonly used for testing the integrity of a file.
4. SHA Encryption Method
SHA is a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by NIST as a U.S. Federal Information Processing Standard.
SHA is the Secure Hash Algorithm. The types of SHA SHA-0, SHA-1, and SHA-2.
For SHA-2 algorithm is identical to the summary measure of well-known variables as SHA-224, SHA-256, SHA-384, and SHA-512.
5. RC4 Encryption Method
RC4 is one type of stream ciphers, ie processing units or input data at a time. Unit or data in general, a byte or sometimes even a bit (byte in RC4).
In this way the encryption or decryption can be performed on a variable length.
RC4 is a stream cipher encryption made by Ron Riverst in 1987 for RSA Security.
Algorithm based on random permutations.
6. Base64 Encryption Method
Base64 is a system to represent the raw data bytes as ASCII characters.
Base64 provides 6-bit encoding 8-bit ASCII characters.
Base64 is a format that is printed using characters, allowing binary data to be sent in the form and email, and will be stored in databases or files.
0 Komentar untuk "Encryption Method For Web Programming"