Cryptographic Hash Functions

Advanced Hash Calculator supports several cryptographic hash functions. It can calculate hash value of the file contents using CRC32, GOST, MD2, MD4, MD5, SHA1, SHA2-256, SHA2-384 and SHA2-512 algorithms.

CRC32 - is the most one of the most simple and fast hashing functions. CRC stands for cyclic redundancy check. This hashing function is popular because this function is easy to implement in binary hardware, easy to analyze mathematically, and it is particularly good at detecting common errors.

GOST - is a 256-bit cryptographic hash function initially defined in the Russian national standard. This hashing function uses a block cipher.

MD2 - is a cryptographic hash function developed by Ronald Rivest in 1989. The 128-bit hash value of a message is created by padding it to a multiple of the block length(128 bits or 16 bytes) and adding a 16-byte checksum to it. This hash function is no longer considered secure, however it is still widely used in old infrastructure. 

MD4 is known to be used for calculating URI in eDonkey2000 / eMule P2P networks. This algorithm has been developed in 1990 and has a digest length of 128 bits. It is also is no longer considered secure.

MD5 Message-Digest Algorithm is a popular used cryptographic hash function that produces a 128-bit (16-byte) hash value. MD5 digests are used in the software world to provide some assurance that a transferred file has been downloaded and saved. File servers often provide a pre-computed MD5 (known as Md5sum) checksum values for the files, so that a computer user can compare pre-computed MD5 to the the checksum of the downloaded file.

SHA-1 was designed by the United States National Security Agency and stands for a secure hash algorithm. This method is the most commonly used of the existing SHA hash functions, and is employed in multiple widely used applications and protocols

SHA2-256, SHA2-384, SHA2-512 belong to the set of SHA2 cryptographic hash functions. SHA2 includes a significant number of changes from its predecessor. The numbers 256, 384 or 512 reflect the digest length that are 256, 384 or 512 bits respectively. SHA-2 hash functions are implemented in some widely used security software applications and network  protocols, including TLS and SSL, PGP, SSH, S/MIME, Bitcoin and IPsec

 

 

   
  Software
   
  Algorithms
   
  Help
   
  Download
   
  Order
   
 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2000-2016, Ashkon Software LLC