SHA-2 has not yet been hacked – and that is probably the biggest advantage: the security of the hash algorithm. The incompatibility with some operating systems/applications also shows the advantage that outdated technologies have to be updated and their security strengthened.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert