英語 での Hash algorithm の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Further, it is not yet clear which stronger hash algorithm will be a good choice for the long term.
The first one, the hash algorithm, aggregates the input records in a temporary hash table.
The MD5 hash algorithm has been disabled with Firefox 16 because it's not secure.
The strength of the hash algorithm used in signing a digital certificate is a critical element of the security of the certificate.
However, if the hash algorithm has some flaws, as SHA-1 does, a well-funded attacker can craft a collision.
One consequence of a weakness in the hash algorithm is a hash collision attack.
The user design remains disabled until the hash algorithm computation in both the FPGA and the secure memory match.
Note: The same Cisco-proprietary hash algorithm is also implemented in Cisco Catalyst 6500/6000 Series Switches that run Cisco IOS software.
This clearly means that SHA1 or any other plain hash algorithm is clearly a no go for secure password authentication.
Note: This table only lists the number of values, which the hash algorithm calculates, that a particular port accepts.
Any change in the hash algorithm is recommended during non-production hours.
These same considerations about the quality of the hash algorithm apply to Elgamal signatures.
Note: The hash algorithm cannot be configured or changed to load balance the traffic among the ports in an EtherChannel.
Hash algorithm"%1" not found. Please choose another one.
OpenvpnManagementHandler: Hash algorithm %1 could not be found. Please check your OpenVPN settings.
In this example, you use a simple salt and SHA-256, but the salt is configurable and the hash algorithm can be changed.
GetHash() accepts the name of a hash algorithm as first.
HMAC uses a hash algorithm in combination with a shared secret key to help make sure that the data has not been modified during transmission.
Hash_algorithm: Select the hash algorithm to verify the file. options are'md5','sha256', and'auto'. The default'auto' detects the hash algorithm in use.
Check the Allow SHA-1 globally(not recommended) box only if your domain or organization must use Secure Hash Algorithm 1(SHA-1).