why there churned opposite hashing algorithm providers system.security.cryptography?
as documented , there several providers opposite hashing algorithms (e.g. md5, sha, ripe). any algorithms, any accessible doing seems tumble 1 3 categories:
- [algo]cng
- [algo]cryptoserviceprovider
- [algo]managed
why there churned implementations any hashing algorithms?
what differences between implementations?
what receptive differences selecting doing exercise an application?
references:
Comments
Post a Comment