{"id":116,"date":"2017-12-27T12:07:59","date_gmt":"2017-12-27T11:07:59","guid":{"rendered":"https:\/\/www.cipv6.de\/worp\/?p=116"},"modified":"2017-12-27T12:07:59","modified_gmt":"2017-12-27T11:07:59","slug":"choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017","status":"publish","type":"post","link":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/","title":{"rendered":"Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017"},"content":{"rendered":"<p>Source: <em><a href=\"\/\/www.javacodegeeks.com\/2017\/12\/choosing-java-cryptographic-algorithms-part-1-hashing.html\">Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[39,59],"class_list":["post-116","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-android","tag-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Choosing Java Cryptographic Algorithms Part 1 - Hashing | Java Code Geeks - 2017 - cipv6.de<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Choosing Java Cryptographic Algorithms Part 1 - Hashing | Java Code Geeks - 2017 - cipv6.de\" \/>\n<meta property=\"og:description\" content=\"Source: Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"cipv6.de\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-27T11:07:59+00:00\" \/>\n<meta name=\"author\" content=\"ugu5ma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ugu5ma\" \/>\n<meta name=\"twitter:site\" content=\"@ugu5ma\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ugu5ma\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/\"},\"author\":{\"name\":\"ugu5ma\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\"},\"headline\":\"Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017\",\"datePublished\":\"2017-12-27T11:07:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/\"},\"wordCount\":23,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\"},\"keywords\":[\"Android\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/\",\"url\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/\",\"name\":\"Choosing Java Cryptographic Algorithms Part 1 - Hashing | Java Code Geeks - 2017 - cipv6.de\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#website\"},\"datePublished\":\"2017-12-27T11:07:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2017\\\/12\\\/27\\\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#website\",\"url\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/\",\"name\":\"cipv6.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\",\"name\":\"ugu5ma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\",\"caption\":\"ugu5ma\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\"},\"sameAs\":[\"https:\\\/\\\/cipv6.de\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Choosing Java Cryptographic Algorithms Part 1 - Hashing | Java Code Geeks - 2017 - cipv6.de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/","og_locale":"en_US","og_type":"article","og_title":"Choosing Java Cryptographic Algorithms Part 1 - Hashing | Java Code Geeks - 2017 - cipv6.de","og_description":"Source: Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017","og_url":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/","og_site_name":"cipv6.de","article_published_time":"2017-12-27T11:07:59+00:00","author":"ugu5ma","twitter_card":"summary_large_image","twitter_creator":"@ugu5ma","twitter_site":"@ugu5ma","twitter_misc":{"Written by":"ugu5ma"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/#article","isPartOf":{"@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/"},"author":{"name":"ugu5ma","@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d"},"headline":"Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017","datePublished":"2017-12-27T11:07:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/"},"wordCount":23,"commentCount":0,"publisher":{"@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d"},"keywords":["Android"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/","url":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/","name":"Choosing Java Cryptographic Algorithms Part 1 - Hashing | Java Code Geeks - 2017 - cipv6.de","isPartOf":{"@id":"https:\/\/www.cipv6.de\/worp\/#website"},"datePublished":"2017-12-27T11:07:59+00:00","breadcrumb":{"@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/27\/choosing-java-cryptographic-algorithms-part-1-hashing-java-code-geeks-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cipv6.de\/worp\/"},{"@type":"ListItem","position":2,"name":"Choosing Java Cryptographic Algorithms Part 1 &#8211; Hashing | Java Code Geeks &#8211; 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.cipv6.de\/worp\/#website","url":"https:\/\/www.cipv6.de\/worp\/","name":"cipv6.de","description":"","publisher":{"@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cipv6.de\/worp\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d","name":"ugu5ma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g","caption":"ugu5ma"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g"},"sameAs":["https:\/\/cipv6.de"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9uBTs-1S","jetpack-related-posts":[{"id":358,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/01\/19\/create-a-secure-spring-rest-api-java-code-geeks-2019\/","url_meta":{"origin":116,"position":0},"title":"Create a Secure Spring REST API | Java Code Geeks &#8211; 2019","author":"ugu5ma","date":"January 19, 2019","format":false,"excerpt":"Interesting article from Raphael Do_vale on Java Code Geeks. Source: Create a Secure Spring REST API | Java Code Geeks - 2019","rel":"","context":"In \"java\"","block_context":{"text":"java","link":"https:\/\/www.cipv6.de\/worp\/index.php\/tag\/java\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":271,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2018\/11\/25\/build-a-restful-api-in-go-using-aws-lambda-java-code-geeks-2018\/","url_meta":{"origin":116,"position":1},"title":"Build a RESTful API in Go using AWS Lambda | Java Code Geeks &#8211; 2018","author":"ugu5ma","date":"November 25, 2018","format":false,"excerpt":"Interested to learn about RESTful API? Check this article from javacodegeeks explaining how to design, build, and deploy a RESTful API in Go using AWS Lambda. Source: Build a RESTful API in Go using AWS Lambda | Java Code Geeks - 2018","rel":"","context":"In \"Uncategorized\"","block_context":{"text":"Uncategorized","link":"https:\/\/www.cipv6.de\/worp\/index.php\/tag\/uncategorized\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":161,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2018\/03\/27\/run-fn-functions-on-k8s-on-google-cloud-platform\/","url_meta":{"origin":116,"position":2},"title":"Run Fn Functions on K8s on Google Cloud Platform","author":"ugu5ma","date":"March 27, 2018","format":false,"excerpt":"Java Code Geeks has a nice article about this subject.","rel":"","context":"In \"iaas\"","block_context":{"text":"iaas","link":"https:\/\/www.cipv6.de\/worp\/index.php\/tag\/iaas\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":123,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2018\/01\/01\/raspi-update-java\/","url_meta":{"origin":116,"position":3},"title":"Raspi: Update Java","author":"ugu5ma","date":"January 1, 2018","format":false,"excerpt":"In diesem Code-Quickie installieren wir die aktuellste Version von Oracle Java 8 auf dem Raspberry Pi. Diese ist aktueller als der Standardpaketliste.","rel":"","context":"In \"Raspi\"","block_context":{"text":"Raspi","link":"https:\/\/www.cipv6.de\/worp\/index.php\/tag\/raspi\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":112,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2017\/12\/24\/android-how-can-i-hide-the-softkeyboard-when-the-input-was-made\/","url_meta":{"origin":116,"position":4},"title":"Android: How can I hide the softkeyboard when the input was made ?","author":"ugu5ma","date":"December 24, 2017","format":false,"excerpt":"Just add the two lines into your code: [java] InputMethodManager manager = (InputMethodManager) getSystemService(Context.INPUT_METHOD_SERVICE); manager.hideSoftInputFromWindow(editText.getWindowToken(), 0); [\/java] \u00a0","rel":"","context":"In \"Android\"","block_context":{"text":"Android","link":"https:\/\/www.cipv6.de\/worp\/index.php\/tag\/android\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":212,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2018\/11\/12\/android-canvas-put-bitmap-in-the-middle-of-the-screen\/","url_meta":{"origin":116,"position":5},"title":"Android Canvas: put Bitmap in the middle of the screen","author":"ugu5ma","date":"November 12, 2018","format":false,"excerpt":"Code: [java] canvas.drawBitmap(bitmap, (getMeasuredWidth()\/2)-(bitmap.getWidth()\/2), (getMeasuredHeight()\/2 -(bitmap.getHeight()\/2)), null); [\/java]","rel":"","context":"In \"Android\"","block_context":{"text":"Android","link":"https:\/\/www.cipv6.de\/worp\/index.php\/tag\/android\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/posts\/116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/comments?post=116"}],"version-history":[{"count":0,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/posts\/116\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/media?parent=116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/categories?post=116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/tags?post=116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}