
28 May
2010
28 May
'10
4:26 p.m.
Popular hash algorithms (MD5, SHA, ...) involve a preprocessing stage to turn bytes (or individual bits) into (32- or 64-bit) words, using a certain byte (and bit) order.
<snip> Hi Scott, I am sorry but I can't speak intelligently about the suitability of my endian implementation for this particular purpose. Perhaps someone else with some experience in cryptographic hash functions can comment. I didn't want to just ignore your comment but this simply isn't an area of my expertise. Tom