Free Hash Generator

Share on social media

A simple program that can generate hashes such as md5, sha1, sha2 and much more.

Hash function – a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible shortcut. In computer science, hash functions allow you to set short and easy-to-verify signatures for arbitrarily large data sets. Signatures can protect against accidental or deliberate data modifications (checksums), and can also be used to optimize access to data structures in computer programs (hash tables).

screen Free Hash Generator

Supported algorithms :

MD2

MD2 hash function created in 1989 by Ron Rivest . This algorithm has been optimized for 8- bit computers . MD2 is described in RFC1319 . It is currently not considered a secure hash function and should not be used.

MD4

MD4 hash function designed for cryptographic applications . However, it has been broken ( collisions can be generated on a typical PC in seconds) and is currently useless for security purposes. MD4 has therefore been replaced for virtually all applications by MD5 and other hash functions.

MD5

MD5 ( Message –  Digest algorithm 5 ) – a cryptographic algorithm , developed by Ron Rivest (co-creator of RSA ) in 1991 , which is a popular cryptographic hash function that generates a 128- bit hash from a string of data of any length . In 2004 a way to generate MD5 collisions was found , which lowers its security in some applications (e.g. file signing).

See also  Free Twitter Downloader

SHA-1

SHA-1 was published in 1995 and completely replaced the withdrawn (due to undisclosed defects) from SHA-0 use. SHA-0 and SHA-1 form a 160-bit hash from messages with a maximum size of 2 64 bits and are based on similar principles to MD5 . The SHA-1 algorithm should not be used in new applications

SHA-2

SHA-2 – A set of cryptographic hash functions ( SHA-224 , SHA-256 , SHA-384 , SHA-512 ) designed by the National Security Agency (NSA) and published in 2001 by the National Institute of Standards and Technology (NIST) as Federal U.S. government information processing standard . SHA stands for Secure Hash Algorithm. SHA-2 includes a number of changes that distinguish it from its predecessor SHA-1 . SHA-2 consists of a set of four hashed functions of 224, 256, 384, or 512 bits.

SHA2-256
SHA2-384
SHA2-512


GOST
GOST-256-Streebog
GOST-512-Streebog
Grindahl256
Grindahl512
Has160
RIPEMD-128
RIPEMD-160
RIPEMD-256
RIPEMD-320

SHA3-224 a cryptographic hash function selected in 2012 in a competition announced by the American NIST The competition for SHA-3 began in 2009. 30 candidates were nominated for it . In 2012, NIST selected the Keccak algorithm as the winner .

SHA3-256
SHA3-384
SHA3-512
Keccak-224
Keccak-256
Keccak-288
Keccak-384
Keccak-512
Panama
Whirlpool
Radiogatun-32
Radiogatun-64
Snefru-128
Snefru-256
Blake2b-160
Blake2b-256
Blake2b-384
Blake2b-512
Blake2s-128
Blake2s-160
Blake2s-224
Blake2s-256
Haval-3-128
Haval-4-128
Haval-5-128
Haval-3-160
Haval-4-160
Haval-5-160
Haval-3-192
Haval-4-192
Haval-5-192
Haval-3-224
Haval-4-224
Haval-5-224
Haval-3-256
Haval-4-256
Haval-5-256

See also  Free Instagram Downloader