A simple program that can generate hashes such as md5, sha1, sha2 and much more.
Hash function – a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible shortcut. In computer science, hash functions allow you to set short and easy-to-verify signatures for arbitrarily large data sets. Signatures can protect against accidental or deliberate data modifications (checksums), and can also be used to optimize access to data structures in computer programs (hash tables).
Supported algorithms :
MD2 hash function created in 1989 by Ron Rivest . This algorithm has been optimized for 8- bit computers . MD2 is described in RFC1319 . It is currently not considered a secure hash function and should not be used.
MD4 hash function designed for cryptographic applications . However, it has been broken ( collisions can be generated on a typical PC in seconds) and is currently useless for security purposes. MD4 has therefore been replaced for virtually all applications by MD5 and other hash functions.
MD5 ( Message – Digest algorithm 5 ) – a cryptographic algorithm , developed by Ron Rivest (co-creator of RSA ) in 1991 , which is a popular cryptographic hash function that generates a 128- bit hash from a string of data of any length . In 2004 a way to generate MD5 collisions was found , which lowers its security in some applications (e.g. file signing).
SHA-1 was published in 1995 and completely replaced the withdrawn (due to undisclosed defects) from SHA-0 use. SHA-0 and SHA-1 form a 160-bit hash from messages with a maximum size of 2 64 bits and are based on similar principles to MD5 . The SHA-1 algorithm should not be used in new applications
SHA-2 – A set of cryptographic hash functions ( SHA-224 , SHA-256 , SHA-384 , SHA-512 ) designed by the National Security Agency (NSA) and published in 2001 by the National Institute of Standards and Technology (NIST) as Federal U.S. government information processing standard . SHA stands for Secure Hash Algorithm. SHA-2 includes a number of changes that distinguish it from its predecessor SHA-1 . SHA-2 consists of a set of four hashed functions of 224, 256, 384, or 512 bits.
SHA3-224 a cryptographic hash function selected in 2012 in a competition announced by the American NIST The competition for SHA-3 began in 2009. 30 candidates were nominated for it . In 2012, NIST selected the Keccak algorithm as the winner .