This generates various hash algorithms.
Hash is the irreversibly transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.
It is used to check whether the message of mail has been falsified and whether the data downloaded from the website or copied from the media is damaged.
The hash value is a numerical value obtained by shortening the data of 0 and 1 to the same length using a fixed rule and obtained using a hash function such as MD5 or SHA-1.
The length of the hash value is constant(160 bits). It is difficult to tamper with the same hash value, which is useful for tamper detection and file identity verification.
hashing algorithms are amd2, md4, md5, sha1, sha224, sha256, sha384, sha512, ripemd128, ripemd160, ripemd256, ripemd320, whirlpool, tiger128,3, tiger160,3, tiger192,3, tiger128,4, tiger160,4, tiger192,4, snefru, snefru256, gost, gost-crypto, adler32, crc32, crc32b, fnv132, fnv1a32, fnv164, fnv1a64, joaat, haval128,3, haval160,3, haval192,3, haval224,3, haval256,3, haval128,4, haval160,4, haval192,4, haval224,4, haval256,4, haval128,5, haval160,5, haval192,5,haval224,5, haval256,5