Hashing Algorithm - SHA 1 , 2 , 3 . MD5 & SHA 1 are not used because of Collision . SHA 256 is mostly wide used in today's world Digital Signature Algorithm - SHA-256 ECDSA , SHA-256 with RSA Encryption , SHA-256 with ECC (Used in less compute devices ), SHA-256 DSA
@CesarMontes-wk9mrАй бұрын
This is critical in a legal proceeding where one of the parts provide an electronic evidence of a crime or proof of something to the Authority because a forensic expert like an auditor will validate the integrity and validity of evidence.
@nithyakrishna11662 жыл бұрын
So well explained. Thank you!
@arunrajrl23692 жыл бұрын
wow, thank you Prabh. explained simply to understand the concept.
@LS-dk8pj Жыл бұрын
Prabh, many thanks for sharing and taking the time to do this.