PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES …

P Boyanov - Journal scientific and applied research, 2024 - jsar.ftn.shu.bg
In this scientific paper hash functions such as MD5, SHA-1, and SHA-256 are widely utilized
in the field of cryptography to verify file integrity, confirming that files remain unaltered and …

Cryptography tools in ethical hacking

B Pandey, K Kumar, P Pandey… - … Mechanisms for Data …, 2025 - taylorfrancis.com
In this chapter, we discuss encoding and decoding algorithms, such as Base64 and percent-
encoded-uniform resource locators (URL), which can be used to hide and extract malicious …