Instead of directly asking for donations, I'm thrilled to offer you all nine of my books for just $9 on leanpub By grabbing this bundle you not only help cover my coffee, beer, and Amazon bills but also play a crucial role in advancing and refining this project. Your contribution is indispensable, and I'm genuinely grateful for your involvement in this journey!
Any private key value that you enter or we generate is not stored on this site, this tool is provided via an HTTPS URL to ensure that private keys cannot be stolen, for extra security run this software on your network, no cloud dependency
Hashing is not encryption. There is no secret, no key in hashing
Hashing is a function from some bit string (usually variable length) to another bit string (usually smaller, and of fixed length
Strengths of the Security Properties of the Approved Hash Algorithms
SHA-1 |
SHA- 224 |
SHA- 256 |
SHA- 384 |
SHA- 512 |
SHA- 512/224 |
SHA- 512/256 |
|
Collision Resistance Strength in bits |
< 80 |
112 |
128 |
192 |
256 |
112 |
128 |
Preimage Resistance Strength in bits |
160 |
224 |
256 |
384 |
512 |
224 |
256 |
Second Preimage Resistance Strength in bits |
105- 160 |
201- 224 |
201- 256 |
384 |
394- 512 |
224 |
256 |
List of Hash function and the length
Name | Length |
MD2 | 128 bits |
MD4 | 128 bits |
MD5 | 128 bits |
MD6 | Up to 512 bits |
SHA-1 | 160 bits |
SHA-224 | 224 bits |
SHA-256 | 256 bits |
SHA-384 | 384 bits |
SHA-512 | 512 bits |
SHA-3 (originally known as Keccak) | arbitrary |