Hash Generator

Generate different types of hashes.


Hash Generator

Our online Hash Generator supports a wide range of hashing algorithms, ensuring you have the flexibility to choose the hash that best suits your needs. Below, we've grouped the supported hash functions by families and provided a short description for each group.


ADLER32:

  • Algorithm Type: Checksum
  • Hash Length: 32 bits
  • Common Usage: checksums for data integrity.


CRC32, CRC32B, CRC32C:

  • Algorithm Type: Cyclic Redundancy Check (CRC).
  • Hash Length: 32 bits
  • Common Usage: checksums for data integrity, network communication error checking.


FNV132, FNV1A32, FNV164, FNV1A64:

  • Fowler–Noll–Vo (FNV) non-cryptographic hash function.
  • Hash Length: 32 bits and 64 bits, respectively.


HAVAL128,3, HAVAL160,3, HAVAL192,3, HAVAL224,3, HAVAL256,3,
HAVAL128,4, HAVAL160,4, HAVAL192,4, HAVAL224,4, HAVAL256,4,
HAVAL128,5, HAVAL160,5, HAVAL192,5, HAVAL224,5, HAVAL256,5,

  • HAVAL is a cryptographic hash function with variable lengths (128, 160, 192, 224, and 256 bits). 
  • HAVAL also allows users to specify the number of rounds (3, 4, or 5) to be used to generate the hash.


JOAAT:

  • Jenkins One-at-a-Time hash function.
  • Hash Length: 32 bits


MD2, MD4, MD5: 

  • These are part of the MD (Message Digest) hashing algorithm family, producing hash values of 128 bits in lengths.
  • Commonly used for file integrity checks and password hashing.
  • MD5 is vulnerable to collision attacks and not recommended for cryptographic security applications.


RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320:

  • RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family.
  • Hash Length: Variable (128, 160, 256, 320 bits, respectively)
  • Commonly used for integrity checks in various protocols and cryptographic applications, blockchain technology.
  • RIPEMD-128 is not considered secure due to the short hash length (128-bit).


SHA1, SHA224, SHA256, SHA384, SHA512, SHA512/224, SHA512/256:

  • SHA1 and SHA2 Secure Hash Algorithms, with length varying from 160 bits to 512 bits.
  • Commonly used for data integrity verification, digital signatures, password hashing.
  • SHA1 is deprecated due to vulnerabilities. SHA-256 or higher should be used.


SHA3-224, SHA3-256, SHA3-384, SHA3-512:

  • The SHA3 family was designed as a direct substitution for SHA2.
  • Hash Length: Variable (224, 256, 384, 512 bits, respectively)
  • Common Usage: cryptographic applications, blockchain technology.


SNEFRU, SNEFRU256:

  • Algorithm Type: Cryptographic Hash Function
  • Hash Length: Variable (128, 256 bits)


TIGER128,3, TIGER160,3, TIGER192,3,
TIGER128,4, TIGER160,4, TIGER192,4:

  • These are TIGER hash functions with fixed hash lengths of 128, 160, and 192 bits, respectively.
  • TIGER128 and TIGER160 are truncated versions (prefixes) of the full TIGER192 hash value and designed for compatibility with applications requiring a particular hash size. 
  • TIGERxxx,3 vs TIGERxxx,4


WHIRLPOOL:

  • Algorithm Type: Cryptographic Hash Function
  • Hash Length: 512 bits


See Also:


Contact

Missing something?

Feel free to request missing tools or give some feedback using our contact form.

Contact Us