SHA-3 is KECCAK
Uranuz
neuranuz at gmail.com
Wed Jan 22 00:41:37 PST 2014
>> 4. Is it really essential to someone tho crack you security.
It's beacuse I wrote it at night.
I mean that developer should estimate security level that needed
and do not reinvent complicated security system where it's not
essential. But question is how to evaluate security level itself
and what type of protection is needed for concrete data to be
protected.
Thanks for responses. Now I'm trying to use OpenSSL library that
has complete set of crypto primitives. But I'll try to take
bcrypt, scrypt into consideration
More information about the Digitalmars-d
mailing list