-
Notifications
You must be signed in to change notification settings - Fork 5
Algorithms
Jacksum supports 489 algorithms including cryptographic and non-cryptographic hash functions.
-
National and international standards of cryptographic hash functions (descending alphabetical sorting of the countries):
-
United States of America (USA)
- SHA-3-family: SHA3-[224,256,384,512], SHAKE[128,256] (NIST FIPS 202)
- SHA-2-family: SHA-[224,256,384,512], SHA-512/[224,256] (NIST FIPS 180-4)
- SHA-1
-
Ukraine
- Kupyna[256,384,512] (DSTU 7564:2014)
-
Russian Federation
- Streebog-[256,512] (GOST R 34.11-2012)
- GOST Crypto-Pro (GOST R 34.11-94)
- GOST (GOST R 34.11-94)
-
Republic of Korea (ROK)
- LSH-256-[224,256], LSH-512-[224,256,384,512] (KS X 3262)
- HAS-160 (KISA)
-
People's Republic of China (PRC)
- SM3
-
-
4 of 5 finalists that support hashing of the NIST Lightweight Cryptography competition (2019–2023):
- Ascon-Hash and Ascon-Hasha
- Ascon-xof and Ascon-xofa
- Esch[256, 384]
- PHOTON-Beetle Hash
- Xoodyak
-
All 5 candidates from round 3 the NIST SHA-3 competition (2007-2012):
- BLAKE-[224,256,348,512]
- Groestl-[224,256,384,512]
- JH[224,256,284,512]
- Keccak[224,256,384,512]
- Skein-256-[8..256], Skein-512-[8..512], Skein-1024-[8..1024]
-
3 of 14 candidates from round 2 of the NIST SHA-3 competition (2007-2012):
- ECHO-[224,256,348,512]
- Fugue-[224,256,348,512]
- Luffa-[224,256,348,512]
-
Proposals from the 2005 NIST workshops before the SHA-3 competition:
- DHA-256
- FORK-256
- VSH-1024
-
International accepted, modern strong cryptographic hash functions:
- BLAKE2s-[8..256]
- BLAKE2b-[8..512]
- BLAKE2sp-256
- BLAKE2bp-512
- BLAKE3
- ed2k
- HAVAL-[160,192,224,256]-[3,4,5]
- RadioGatun[32,64]
- RIPEMD[160,256,320]
- Tiger2
- PHP's variants on Tiger ("tiger192,4", "tiger160,4", and "tiger128,4")
- Whirlpool
-
eXtendable Output Functions (XOF) as cryptographic hash functions with a fixed length:
- SHAKE128
- SHAKE256
- KangarooTwelve
- MarsupilamiFourteen
-
Broken cryptographic hash functions for education and backwards compatibility purposes:
- HAVAL-128-[3,4,5]
- MD2
- MD4
- MD5
- MDC2
- PANAMA
- RIPEMD-128
- SHA-0
- SHA-1
- Tiger
- Tiger/128
- Tiger/160
- Whirpool-0
- Whirlpool-T
-
Standard Cyclic Redundancy Checks (CRCs)
- CRC-8 (FLAC)
- CRC-16 (LHA/ARC), CRC-16 (Minix), FCS-16
- CRC-24 (OpenPGP)
- CRC-32 (FCS-32), CRC-32 (MPEG-2), CRC-32 (bzip2), CRC-32 (FDDI), CRC-32 (UBICRC32), CRC-32 (PHP's crc32)
- CRC-64 (ISO 3309), CRC-64 (ECMA-182), CRC-64 (prog lang GO, const ISO), CRC-64 (.xz and prog lang GO, const ECMA)
- CRC-82 (DARC)
-
Cyclic Redundancy Checks (CRCs) with more than 6 parameters
- cksum (Unix, POSIX 1003.2)
- sum (Plan 9)
-
Classic Checksums
- Adler-32
- AST strsum PRNG hash
- cksum (Minix)
- ELF (Unix)
- Fletcher's Checksum
- FNV-0_[32,64,128,256,512,1024]
- FNV-1_[32,64,128,256,512,1024]
- FNV-1a_[32,64,128,256,512,1024]
- joaat
- PRNG hash (including parameters)
- sum (BSD Unix)
- sum (Minix)
- sum (System V Unix)
- sum [8,16,24,32,40,48,56,64]
- xor8
- XXH32
- All available algorithms with details
- Usage Cheet Sheet: What algorithms are available
Jacksum • https://jacksum.net • Jacksum on GitHub