Language-independent – What algorithms should I use when performing FilecheckSums to find deception?

Is the amount of MD5 still suitable for checking file fraud? I know it is not safe, but is it really important in the case of trying to find file spoofing?

Should I use something in the SHA series?

What is the best practice for this use case?

In this particular case, the choice of algorithm may not be so important. Use SHA1 instead of The main reasons for MD5 are all related to creating cryptographically secure signatures.

MD5 should be completely acceptable for this task, because you may not need to worry about people maliciously making files to generate wrong duplicates.

Is the amount of MD5 still suitable for checking file fraud? I know it is not safe, but is it really important in the case of trying to find file spoofing?

Should I use something in the SHA series?

What is the best practice for this use case?

In this particular case, the choice of algorithm may not be so important. The main reason for using SHA1 instead of MD5 is related to the creation of cryptographically secure signatures.

MD5 should be completely acceptable for this task, because you may not need to worry about people maliciously crafting files to generate wrong duplicates.

< /p>

Leave a Comment

Your email address will not be published.