![]() ![]() ![]() Then the person receiving the file can run a hash on the file to see if it matches the hash that was sent. Another popular use case for hashes is to hash a file and then send the file and its hash separately. Of course, the hash has to be a good one or it can be decrypted. One of the most popular uses of hashes is storing the hash of a password instead of the password itself. Python also supports the adler32 and crc32 hash functions, but those are in the zlib module. It includes the FIPS secure hash algorithms SHA1, SHA224, SHA256, SHA384, and SHA512 as well as RSA’s MD5 algorithm. ![]() If you need secure hashes or message digest algorithms, then Python’s standard library has you covered in the hashlib module. We will learn how to encrypt and decrypt strings with both of these libraries. We’ll take a brief look at those in the chapter, but the primary focus will be on the following 3rd party packages: P圜rypto and cryptography. Python 3 doesn’t have very much in its standard library that deals with encryption. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |