Examples of using Hash algorithm in English and their translations into Russian
{-}
-
Official
-
Colloquial
Specifying a hash algorithm.
The hash algorithm(MD5 or SHA1).
Encrypt your data with the Snefru hash algorithm.
Typical hash algorithms include MD5, SHA-1, and SHA-256.
The object identifier(OLD)of any supported hash algorithm.
To specify a hash algorithm by using the Windows interface.
Each CSP can support different hash algorithms.
Each hash algorithm has its advantages and its disadvantages.
The SHA-1 cryptographic hash algorithm or the CBC mode in SSH.
The hash algorithm for integrity and authentication(MD5 or SHA1).
Issue a certificate to identify a particular person by hash algorithm;
The hash algorithm that the CA uses to digitally sign the certificate.
Calculates the sha1 hash of$str using the« US Secure Hash Algorithm 1».
You can only specify one hash algorithm and CSP on a client computer.
The hash algorithm that generates a digest of data(or thumbprint) for digital signatures.
The relying party also creates a"message digest" of the message,using the same secure hash algorithm;
In the Hash Algorithm Properties dialog box, click Specific, and then click the hash algorithm you want to use.
On the Configure Cryptography page, select a cryptographic service provider,key length, and hash algorithm.
A hash algorithm is an algorithm that produces a hash value of a piece of data, such as a message or session key.
Each minting request triggers a hash calculation based on the submitted data and the currency hash algorithm.
In the command output,verify that the Cryptographic service provider(CSP) and Hash algorithm settings correspond to the settings configured on HRA.
Because the hash algorithm is designed to work only in one direction, it is impossible to determine the original file inputs from the output alone- making the process tamper-proof.
The Signing tab on the Online Responder Properties page shows the hash algorithm that is used to help verify signing operations for Online Responder responses to clients.
For certificates not based on RSA algorithms, selecting Use alternate signature formats specifies separate object identifiers for the hash algorithm and for the asymmetric algorithm. .
Message Queuing 5.0 supports Secure Hash Algorithm 2.0(SHA2) and all advanced hash algorithms that are supported in this version of Windows.
For certificates based on RSA algorithms, PKCS 1 v2.1 specifies separate object identifiers for the hash algorithm and for the asymmetric algorithm. .
These settings, known as request policy settings,determine which hash algorithm and cryptographic service provider(CSP) a client computer uses to encrypt communication with HRA servers.
Select the hash algorithm for signing certificates issued by this CA. Hash algorithms are used to sign CA certificates and certificates issued by a CA to ensure that they have not been tampered with.
If your HRA servers are not configured to use exactly the same asymmetric key algorithm, hash algorithm, and cryptographic service provider as your client computers, then your HRA servers will not be able to communicate with your client computers.
It has some similarities with hash algorithm, however,it is more universal and has higher accuracy than traditional hash algorithm.