Generate Message Digest of a File


Choose Message Digest

Drag or upload a file to calculate the hash Value e



Your Support Matters!

Instead of directly asking for donations, I'm thrilled to offer you all nine of my books for just $9 on leanpub By grabbing this bundle you not only help cover my coffee, beer, and Amazon bills but also play a crucial role in advancing and refining this project. Your contribution is indispensable, and I'm genuinely grateful for your involvement in this journey!

Any private key value that you enter or we generate is not stored on this site, this tool is provided via an HTTPS URL to ensure that private keys cannot be stolen, for extra security run this software on your network, no cloud dependency



Hashing is not encryption. There is no secret, no key in hashing

Hashing is a function from some bit string (usually variable length) to another bit string (usually smaller, and of fixed length


Strengths of the Security Properties of the Approved Hash Algorithms

 

SHA-1

SHA- 224

SHA- 256

SHA- 384

SHA- 512

SHA- 512/224

SHA- 512/256

Collision Resistance Strength in bits

< 80

112

128

192

256

112

128

Preimage Resistance Strength in bits

160

224

256

384

512

224

256

Second Preimage Resistance Strength in bits

105- 160

201- 224

201- 256

384

394- 512

224

256


List of Hash function and the length

Name Length
MD2 128 bits
MD4 128 bits
MD5 128 bits
MD6 Up to 512 bits
SHA-1 160 bits
SHA-224 224 bits
SHA-256 256 bits
SHA-384 384 bits
SHA-512 512 bits
SHA-3 (originally known as Keccak) arbitrary