You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Nov 20, 2022. It is now read-only.
Copy file name to clipboardExpand all lines: docs/QuickStartGuide.wiki
+15-15Lines changed: 15 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@
7
7
MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files. Though, MD5 is not collision resistant, and it isn't suitable for applications like SSL certificates or digital signatures that rely on this property.
The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.
The Advanced Encryption Standard (AES) is a U.S. Federal Information Processing Standard (FIPS). It was selected after a 5-year process where 15 competing designs were evaluated.
var crypted = Crypto.AES.encrypt("Message", "Secret Passphrase");
@@ -69,7 +69,7 @@ var plain = Crypto.AES.decrypt(crypted, "Secret Passphrase");
69
69
Rabbit is a high-performance stream cipher and a finalist in the eSTREAM Portfolio. It is one of the four designs selected after a 3 1/2-year process where 22 designs were evaluated.
var crypted = Crypto.Rabbit.encrypt("Message", "Secret Passphrase");
@@ -83,7 +83,7 @@ var plain = Crypto.Rabbit.decrypt(crypted, "Secret Passphrase");
83
83
MARC4 (Modified Allegedly RC4) is based on RC4, a widely-used stream cipher. RC4 is used in popular protocols such as SSL and WEP. But though it's remarkable for its simplicity and speed, it has weaknesses. Crypto-JS provides a modified version that corrects these weaknesses, but the algorithm's history still doesn't inspire confidence in its security.
var hmac = Crypto.HMAC(Crypto.SHA256, "Message", "Secret Passphrase");
@@ -148,7 +148,7 @@ PBKDF2 is a password-based key derivation function. In many applications of cryp
148
148
A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.
PBKDF2 with a large iteration count can take a long time to compute. To avoid long-running script warnings, CryptoJS provided an alternative version that executes asyncronously and passes the result to a callback. You also have the option to specify an onProgressChange callback that allows you to keep the user updated.
0 commit comments