Cryptography is essentially used for converting plain text into cipher text to ensure confidentiality. If a user has the appropriate key, the cipher text can be reversed to get the original plain text. A message digest or hash is a technique used to verify and assure the integrity of data.
Unlike encryption, a message digest is a one-way function. This means you cannot recover the original data from the hashed data. Using a particular algorithm, if we calculate the message digest of a string, then the message digest will remain unchanged as long as the string remains unchanged. Even the least change, like adding a space or punctuation mark will completely change its corresponding message digest value. The message digest algorithm transforms input of any length into output of fixed length.
Here is the below list which commonly used message digest algorithms along with their respective output strength in bits.
- MD2 = 128 bits (Designed in 1989)
- MD4 = 128 bits (Designed in 1990)
- MD5 = 128 bits (Designed in 1991)
- MD6 = up to 512 bits
- SHA-1 = 160 bits
- SHA-224 = 224 bits
- SHA-256 = 256 bits
- SHA-384 = 384 bits
- Tiger = 192 bits
- Whirlpool = 512 bits
Message digests are widely used in cryptography, digital signatures, and for validating the authenticity of digital evidence. There are many free tools and websites available that help you calculate the message digest of a file or a string. One such website is http://onlinemd5.com/.
- Computes 128-bit hash value
- Widely used for file integrity checking
- Computes 160-bit hash value
- NIST approved message digest algorithm
- Computes between 128 and 256 bit hash
- Between 3 and 5 rounds
- Developed in Europe published in 1996
Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.