Cryptography is essentially used for converting plain text into cipher text to ensure confidentiality. If a user has the appropriate key, the cipher text can be reversed to get the original plain text. A message digest or hash is a technique used to verify and assure the integrity of data.
Unlike encryption, a message digest is a one-way function. This means you cannot recover the original data from the hashed data. Using a particular algorithm, if we calculate the message digest of a string, then the message digest will remain unchanged as long as the string remains unchanged. Even the least change, like adding a space or punctuation mark will completely change its corresponding message digest value. The message digest algorithm transforms input of any length into output of fixed length.
Here is the below list which commonly used message digest algorithms along with their respective output strength in bits.
- MD2 = 128 bits (Designed in 1989)
- MD4 = 128 bits (Designed in 1990)
- MD5 = 128 bits (Designed in 1991)
- MD6 = up to 512 bits
- SHA-1 = 160 bits
- SHA-224 = 224 bits
- SHA-256 = 256 bits
- SHA-384 = 384 bits
- Tiger = 192 bits
- Whirlpool = 512 bits
Message digests are widely used in cryptography, digital signatures, and for validating the authenticity of digital evidence. There are many free tools and websites available that help you calculate the message digest of a file or a string. One such website is http://onlinemd5.com/.
MD5
- Computes 128-bit hash value
- Widely used for file integrity checking
SHA-1
- Computes 160-bit hash value
- NIST approved message digest algorithm
HAVAL
- Computes between 128 and 256 bit hash
- Between 3 and 5 rounds
RIPEMD-160
- Developed in Europe published in 1996
- Patent-free
- CTEM – A Strategic Approach to Mitigating Cyber Risks
- AI in Penetration Testing – Revolutionizing Security Assessments
- Protecting Your Organization from AI-Enhanced Social Engineering Attacks
- The Rise of AI-Powered Cyber Attacks in 2025
- Top 5 Penetration Testing Methodologies to Follow in 2025
- Top 10 Penetration Testing Tools Every Security Professional Should Know in 2025
- Emerging Trends in Vulnerability Assessment and Penetration Testing (VAPT) for 2025
- The Role of Cybersecurity in Protecting IoT Devices in 2025
- Understanding the Five Phases of Penetration Testing
- Top 20 Cybersecurity Career Options