SHA-3 is KECCAK

Uranuz neuranuz at gmail.com
Wed Jan 22 00:41:37 PST 2014


>> 4. Is it really essential to someone tho crack you security.

It's beacuse I wrote it at night.

I mean that developer should estimate security level that needed 
and do not reinvent complicated security system where it's not 
essential. But question is how to evaluate security level itself 
and what type of protection is needed for concrete data to be 
protected.

Thanks for responses. Now I'm trying to use OpenSSL library that 
has complete set of crypto primitives. But I'll try to take 
bcrypt, scrypt into consideration


More information about the Digitalmars-d mailing list