The Mad Hasher |
The Mad Hasher is a three piece Gtron Live Tool™. The Message and File Hasher returns a string containing the calculated message digest as lowercase hexits and a raw binary representation of the message digest. The Hash Benchmarker simply shows hash times based on a hashing algorithm with 32 bytes of data and over 1000 iterations.
A hash function takes a string of any length as input and produces a fixed length string which acts as a kind of "signature" for the data provided. The practical intention is that a person knowing the hash, is unable to work out the original message, but someone knowing the original message can prove the hash is created from that message, and none other. A cryptographic hash function should behave as much as possible like a random function while still being deterministic and efficiently computable.
A cryptographic hash function is considered "insecure" from a cryptographic point of view, if either of the following is computationally feasible:
Currently supports: crc32(), crc32b, crc32, adler32, sha1(), md5(), md4, tiger128,3, tiger192,3, tiger160,3, md5, sha1, tiger128,4, tiger160,4, ripemd128, tiger192,4, ripemd256, ripemd160, sha256, ripemd320, haval192,3, haval128,3, haval160,3, haval224,3, haval256,3, haval128,4, haval160,4, haval224,4, haval256,4, haval192,4, haval128,5, haval192,5, haval160,5, haval224,5, gost, haval256,5, sha512, sha384, whirlpool, snefru, and md2 |