Hash Generator
Generate different types of hashes.
Hash Generator
Our online Hash Generator supports a wide range of hashing algorithms, ensuring you have the flexibility to choose the hash that best suits your needs. Below, we've grouped the supported hash functions by families and provided a short description for each group.
ADLER32:
- Algorithm Type: Checksum
- Hash Length: 32 bits
- Common Usage: checksums for data integrity.
CRC32, CRC32B, CRC32C:
- Algorithm Type: Cyclic Redundancy Check (CRC).
- Hash Length: 32 bits
- Common Usage: checksums for data integrity, network communication error checking.
FNV132, FNV1A32, FNV164, FNV1A64:
- Fowler–Noll–Vo (FNV) non-cryptographic hash function.
- Hash Length: 32 bits and 64 bits, respectively.
HAVAL128,3, HAVAL160,3, HAVAL192,3, HAVAL224,3, HAVAL256,3,
HAVAL128,4, HAVAL160,4, HAVAL192,4, HAVAL224,4, HAVAL256,4,
HAVAL128,5, HAVAL160,5, HAVAL192,5, HAVAL224,5, HAVAL256,5,
- HAVAL is a cryptographic hash function with variable lengths (128, 160, 192, 224, and 256 bits).
- HAVAL also allows users to specify the number of rounds (3, 4, or 5) to be used to generate the hash.
JOAAT:
- Jenkins One-at-a-Time hash function.
- Hash Length: 32 bits
MD2, MD4, MD5:
- These are part of the MD (Message Digest) hashing algorithm family, producing hash values of 128 bits in lengths.
- Commonly used for file integrity checks and password hashing.
- MD5 is vulnerable to collision attacks and not recommended for cryptographic security applications.
RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320:
- RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family.
- Hash Length: Variable (128, 160, 256, 320 bits, respectively)
- Commonly used for integrity checks in various protocols and cryptographic applications, blockchain technology.
- RIPEMD-128 is not considered secure due to the short hash length (128-bit).
SHA1, SHA224, SHA256, SHA384, SHA512, SHA512/224, SHA512/256:
- SHA1 and SHA2 Secure Hash Algorithms, with length varying from 160 bits to 512 bits.
- Commonly used for data integrity verification, digital signatures, password hashing.
- SHA1 is deprecated due to vulnerabilities. SHA-256 or higher should be used.
SHA3-224, SHA3-256, SHA3-384, SHA3-512:
- The SHA3 family was designed as a direct substitution for SHA2.
- Hash Length: Variable (224, 256, 384, 512 bits, respectively)
- Common Usage: cryptographic applications, blockchain technology.
SNEFRU, SNEFRU256:
- Algorithm Type: Cryptographic Hash Function
- Hash Length: Variable (128, 256 bits)
TIGER128,3, TIGER160,3, TIGER192,3,
TIGER128,4, TIGER160,4, TIGER192,4:
- These are TIGER hash functions with fixed hash lengths of 128, 160, and 192 bits, respectively.
- TIGER128 and TIGER160 are truncated versions (prefixes) of the full TIGER192 hash value and designed for compatibility with applications requiring a particular hash size.
- TIGERxxx,3 vs TIGERxxx,4
WHIRLPOOL:
- Algorithm Type: Cryptographic Hash Function
- Hash Length: 512 bits
See Also:
- Wikipedia - List of hash functions
- Wikipedia - Comparison of cryptographic hash functions
- Wikipedia - Hash function security summary
Related Tools
Contact
Missing something?
Feel free to request missing tools or give some feedback using our contact form.
Contact Us