Two ways to implement SHA-256 encryption in Java

http://blog.csdn.net/u012188107/article/details/69267054

BASE64, MD5, SHA, HMAC several encryption algorithms.
https://www.cnblogs.com/shuaiandjun/p/5664893.htmlWhich

security is high in AES-256 and SHA-256 in encryption technology
These two belong to different security, AES is used for encryption, SHA is used for protection Tampering, this depends on your application scenario to determine which security is high.

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326136854&siteId=291194637