Welcome Guest | My Membership | Login

Master Class

  • IS.HASH.HMACSHA1: Generating HMAC-SHA1 Values with Generic MultiValue BASIC

    The Message Authentication Code (MAC) is a widely used technique for performing message authentication. HMAC (short for "keyed-Hashing for Message Authentication"), a variation on the MAC algorithm, has emerged as an Internet standard for a variety of applications.

    Read More...

  • IS.HASH.MD5 Generating MD5 Values with Generic MultiValue BASIC

    The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32-digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications and is also commonly used to verify data integrity.

    Read More...

  • IS.HASH.SHA1: Generating SHA1 values with Generic MultiValue BASIC

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 ash a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

  • IS.HASH.SHA1: Generating SHA1 Values with Generic MultiValue BASIC

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 hash because it has a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need unique one-way signatures.

    Read More...

  • IS.HASH.SHA1: Generating with UniBASIC DIGEST command

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United State NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 a more secure hash value. While not as secure as SHA256, it is still used many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

  • IS.UUID.V1 UUID V1 Time Based Generation

    A Universally Unique Identifier (UUID) is an identifier standard used in many non-MultiValue databases and software to generate a Unique Id outside of using incremental numbers. A UUID is simply a 128-bit unique value that can be expressed as either a larger number, or a string.

    Read More...


Return to top