|
- Author:
- larsivi (IP: 84.48.50.144)
- Timestamp:
- 01/03/08 23:07:27 (16 years ago)
- Comment:
Some minor edits, toc
Legend:
- Unmodified
- Added
- Removed
- Modified
-
ChapterEncodingAndCrypto
v8 |
v9 |
|
1 | 1 | [wiki:CipherComments Leave Comments, Critiques, and Suggestions Here] |
---|
| 2 | [[TOC()]] |
---|
2 | 3 | |
---|
3 | 4 | = Tango Cryptography and Encoding = |
---|
4 | | [[BR]] |
---|
5 | 5 | |
---|
6 | 6 | The Cryptography and Encoding portion of the Tango library defines interfaces for creating hashes of an arbitrary buffer. Hashes can be used for a variety of purposes. Some are used in serial communications to make sure a buffer hasn’t been corrupted during transmission. Some are used as digital signatures – proof that you are who you say you are. Similarly, some are used as part of an authentication header, such as those defined by IPSEC. In any case, the Tango library provides you with easy to use interfaces to leverage this capability in your own application. |
---|
7 | 7 | |
---|
8 | | The Tango library encapsulates the basic behaviors of these hash functions with base class Digest. Once these simple interface |
---|
9 | | is understood you will be able to make use of the following hash algorithms: |
---|
| 8 | The Tango library encapsulates the basic behaviors of these hash functions with the base class Digest. Once this simple interface is understood you will be able to make use of the following hash algorithms: |
---|
10 | 9 | |
---|
11 | | General |
---|
12 | | - CRC 32 |
---|
| 10 | * General |
---|
| 11 | * CRC 32 |
---|
13 | 12 | |
---|
14 | | Secure |
---|
15 | | - MD2, MD4, MD5 |
---|
16 | | - SHA0, SHA1, SHA256, SHA512 |
---|
17 | | - Tiger |
---|
| 13 | * Secure |
---|
| 14 | * MD2, MD4, MD5 |
---|
| 15 | * SHA0, SHA1, SHA256, SHA512 |
---|
| 16 | * Tiger |
---|
18 | 17 | |
---|
19 | 18 | == How it works == |
---|
20 | 19 | |
---|
21 | | At the highest level a cipher is capable of generating a hash using the .update(void[]) method. The cipher encapsulate the algorithms used to generate a hash. The Digest base class of all chipher classes let you provide the cipher with new data and give access to the results of the hash operation. |
---|
| 20 | At the highest level a cipher is capable of generating a hash using the '''.update(void[])''' method. The cipher encapsulate the algorithms used to generate a hash. The Digest base class of all chipher classes let you provide the cipher with new data and give access to the results of the hash operation. |
---|
22 | 21 | |
---|
23 | 22 | === Do it all at once === |
|
|
|
|
|
Copyright © 2006-2024 Tango. All Rights Reserved. | Page Width:
Static or
Dynamic