Advanced Hash Calculator supports several
cryptographic hash functions. It can calculate hash value of the file
contents using CRC32, GOST, MD2, MD4, MD5, SHA1, SHA2-256, SHA2-384 and
CRC32 - is the most one of the most simple
and fast hashing functions. CRC stands for cyclic redundancy check. This hashing function is popular because
this function is easy to implement in binary hardware, easy to analyze mathematically, and
it is particularly good at detecting common errors.
GOST - is a 256-bit cryptographic hash function initially defined in the Russian national standard.
This hashing function uses a block cipher.
MD2 - is a cryptographic hash function developed by Ronald Rivest in 1989.
The 128-bit hash value of a message is created by padding it to a multiple of the block length(128 bits or 16 bytes) and adding a 16-byte checksum to it.
This hash function is no longer considered secure, however it is still
widely used in old infrastructure.
MD4 is known to be used for calculating URI
in eDonkey2000 / eMule P2P networks. This algorithm has been developed
in 1990 and has a digest length of 128 bits. It is also is no longer
MD5 Message-Digest Algorithm is a popular used cryptographic hash function that produces a 128-bit (16-byte) hash value.
MD5 digests are used in the software world to provide some assurance that a transferred file has
been downloaded and saved. File servers often provide a pre-computed MD5 (known as Md5sum) checksum
values for the files, so that a computer user can compare pre-computed MD5
to the the checksum of the downloaded file.
SHA-1 was designed by the United States National Security Agency
and stands for a secure hash algorithm. This method is the most commonly
used of the existing SHA hash functions, and is employed in multiple widely used applications and protocols.
SHA2-512 belong to the set of SHA2 cryptographic hash functions.
SHA2 includes a significant number of changes from its predecessor. The
numbers 256, 384 or 512 reflect the digest length that are 256, 384 or
512 bits respectively. SHA-2 hash functions are implemented in some widely used security
software applications and network protocols, including TLS and SSL, PGP, SSH, S/MIME, Bitcoin and IPsec