Posts

Showing posts from June, 2011

Lifetime of cryptographic Hash functions

Image
Many times developers ask which Hash is the best to work with currently. As I always suggest using SHA-2 family (SHA-224, SHA-256, SHA-384, SHA-512) as they are still not known to be broken, I found this chart very convincing and useful to compare between them:

As you can see only popular SHA-2 are still remain undefeated.
Reference: http://valerieaurora.org/hash.html

Wireless Security- Best Practices

This article is about different kind of Best Practices that should be followed when using Wireless LAN.
A liitle lazy to write it again :) . The article has been published into June 2011 Issue of ClubHack Magazine (Page 20-24).

It can be downloaded here.