Hashing Algorithm - SHA 1 , 2 , 3 . MD5 & SHA 1 are not used because of Collision . SHA 256 is mostly wide used in today's world Digital Signature Algorithm - SHA-256 ECDSA , SHA-256 with RSA Encryption , SHA-256 with ECC (Used in less compute devices ), SHA-256 DSA
This is critical in a legal proceeding where one of the parts provide an electronic evidence of a crime or proof of something to the Authority because a forensic expert like an auditor will validate the integrity and validity of evidence.
Hashing Algorithm - SHA 1 , 2 , 3 . MD5 & SHA 1 are not used because of Collision . SHA 256 is mostly wide used in today's world
Digital Signature Algorithm - SHA-256 ECDSA , SHA-256 with RSA Encryption , SHA-256 with ECC (Used in less compute devices ), SHA-256 DSA
So well explained. Thank you!
super. Thanks a lot
Very useful information. Thanks a lot
This is critical in a legal proceeding where one of the parts provide an electronic evidence of a crime or proof of something to the Authority because a forensic expert like an auditor will validate the integrity and validity of evidence.
wow, thank you Prabh. explained simply to understand the concept.
Prabh, many thanks for sharing and taking the time to do this.
Good explanation