2018 © w-bt
All rights reserved

Security Tools

- Common Services | Security -

SHA-1 Encryptor

The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.

Source
SHA-1 Result

- Related Services -