Tech Articles

Top Hashing Algorithms and their Output Size

Cryptography is essentially used for converting plain text into cipher text to ensure confidentiality. If a user has the appropriate key, the cipher text can be reversed to get the original plain text. A message digest or hash is a technique used to verify and assure the integrity of data.

Unlike encryption, a message digest is a one-way function. This means you cannot recover the original data from the hashed data. Using a particular algorithm, if we calculate the message digest of a string, then the message digest will remain unchanged as long as the string remains unchanged. Even the least change, like adding a space or punctuation mark will completely change its corresponding message digest value. The message digest algorithm transforms input of any length into output of fixed length.

Here is the below list which commonly used message digest algorithms along with their respective output strength in bits.

  • MD2   = 128 bits   (Designed in 1989)
  • MD4   = 128 bits  (Designed in 1990)
  • MD5   = 128 bits  (Designed in 1991)
  • MD6   = up to 512 bits
  • SHA-1   = 160 bits
  • SHA-224   = 224 bits
  • SHA-256   = 256 bits
  • SHA-384   = 384 bits
  • Tiger   = 192 bits
  • Whirlpool   = 512 bits

Message digests are widely used in cryptography, digital signatures, and for validating the authenticity of digital evidence. There are many free tools and websites available that help you calculate the message digest of a file or a string. One such website is http://onlinemd5.com/.

MD5

  • Computes 128-bit hash value
  • Widely used for file integrity checking

SHA-1

  • Computes 160-bit hash value
  • NIST approved message digest algorithm

HAVAL

  • Computes between 128 and 256 bit hash
  • Between 3 and 5 rounds

RIPEMD-160

  • Developed in Europe published in 1996
  • Patent-free

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

H4ck0
Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.
https://www.yeahhub.com/

WHERE SHOULD WE SEND ?

HACKING TUTORIALS & INFOSEC NEWS?

Subscribe to Our Newsletter and Get Instant Delivered to Your Email Inbox.

We respect your privacy and take protecting it seriously.

Leave a Reply

Your email address will not be published. Required fields are marked *