http://blog.csdn.net/u012188107/article/details/69267054
BASE64, MD5, SHA, HMAC several encryption algorithms.
https://www.cnblogs.com/shuaiandjun/p/5664893.htmlWhich
security is high in AES-256 and SHA-256 in encryption technology
These two belong to different security, AES is used for encryption, SHA is used for protection Tampering, this depends on your application scenario to determine which security is high.
Two ways to implement SHA-256 encryption in Java
Guess you like
Origin http://43.154.161.224:23101/article/api/json?id=326136811&siteId=291194637
Ranking