SHA and MAC

SHA
If you want to ensure that the data is not tampered with, you can use a Secured Hash Algorithm(SHA)
MAC
for authenticity of the data you can use a Message Authentication Code(MAC) algorithm

댓글

이 블로그의 인기 게시물

Oracle NLS_DATE_FORMAT 변경

Alternative to IValueConvert, QuickConverter

Stop console process using Ctrl+C.