> Encryption and hashing are different processes with different algorithms - SHA vs MD5. For example, IPSec VPNs hash a packet with MD5 to prevent tampering, then encrypt the hash with SHA256 to prevent viewing.
You do realize that MD5, SHA-1, and SHA-256 are all hashing algorithms?
I highly doubt you meant a cipher built from a hash function (easy to do with
Feistel net, though nobody does that), especially that IPsec doesn't define
any such thing, from what I remember.
Given that you apparently don't understand how encryption and hashing work and
relate to each other, you're not in a position to question the technical
aspects of the story.
You do realize that MD5, SHA-1, and SHA-256 are all hashing algorithms? I highly doubt you meant a cipher built from a hash function (easy to do with Feistel net, though nobody does that), especially that IPsec doesn't define any such thing, from what I remember.
Given that you apparently don't understand how encryption and hashing work and relate to each other, you're not in a position to question the technical aspects of the story.