Hashing algorithms and message integrity
This section explores how hashing algorithms (SHA-256) can be used to ensure the integrity of messages exchanged between hosts
This section explains the key qualities of a hashing algorithm. This discussion also explains how hashing algorithms can be used to ensure the integrity of messages exchanged between a client/sender and server/receiver.
PreviousIntroduction - Wireless security and cryptographyNextCryptographic encryption and confidentiality
Last updated