…
MurmurHash is a non-cryptographic hashing algorithm appropriate for use in any hash-based searches. Austin Appleby developed it, and both the test suite for it, dubbed "SMHasher," are presently hosted on GitHub. There are several variations of it as well, all of which have been placed in the public domain. The two fundamental operations utilized in its inner loop, multiply (MU) and rotate (R), gave rise to the name.
It is not intended to be challenging to reverse by an adversary, unlike cryptographic hash functions, making it inappropriate for use in cryptography.
MurmurHash3 produces a 32-bit or 128-bit hash value. The x86 and x64 versions do not yield the same numbers when utilizing 128 bits because the algorithms are tailored for their respective platforms. SMHasher and MurmurHash3 were released together.
Message Digest (hash) allows direct processing of arbitrary length messages using a variety of hashing algorithms to output an fixed length text.
Output is generally referred to as hash values, hash codes, hash amounts, checksums, digest file, digital fingerprint or simply hashes. Generally the length of the output hashes is less than the corresponding length of the input code. Unlike other cryptographic algorithms, the keys have no hash functions.
MD2 is a weak algorithm invented in 1989, still used today in some public key cryptography.
MD5 is an extremely popular hashing algorithm but now has very well known collision issues. - md5 hash generator
The SHA2 group, especially SHA-512, is probably the most easily available highly secure hashing algorithms available.
CRC32 is a common algorithm for computing checksums to protect against accidental corruption and changes.
Adler-32 is used as a part of the zlib compression function and is mainly used in a way similar to CRC32, but might be faster than CRCs at a cost of reliability.
Based on the GOST 28147-89 Block Cipher. GOST is a Russian National Standard hashing algorithm that produces 256-bit message digests.
Whirlpool is a standardized, public domain hashing algorithm that produces 512 bit digests.
RIPEMD-128 is a drop-in replacement for the RIPEMD-160 algorithm. It produces 128-bit digests, thus the "128" after the name.
A patent-free algorithm designed in 1995 originally to be optimized for 64-bit DEC Alpha, TIGER today produces fast hashing with security probably on the same order as the SHA2 group or better.
HAVAL is a flexible algorithm that can produce 128, 160, 192, 224, or 256-bit hashes. The number after the HAVAL (e.x. HAVAL128) represents the output size, and the number following the comma (as in HAVAL128,3) represents the "rounds" or "passes" it makes (each pass making it more secure, in theory & some aspects).
This version produces 128-bit digests. SNEFRU-256 also exists but is not currently supported on this site.
[{ins-quote}]
Cryptographic hashing has been an integral part of the cybersecurity spectrum. In fact, it is widely used in different technologies including Bitcoin and other cryptocurrency protocols. Supported hashing algorithms:
One of FNV's key advantages is that it is very simple to implement. Start with an initial hash value of FNV offset basis. For each byte in the input, multiply hash by the FNV prime, then XOR it with the byte from the input. The alternate algorithm, FNV-1a, reverses the multiply and XOR steps.
Research has uncovered weaknesses which make further use of HAVAL (at least the variant with 128 bits and 3 passes with 26 operations) questionable. On 17 August 2004, collisions for HAVAL (128 bits, 3 passes) were announced by Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu.
Let us change our traditional attitude to the construction of programs: Instead of imagining that our main task is to instruct a computer what to do, let us concentrate rather on explaining to human beings what we want a computer to do.
Donald E. Knuth
…
…