The Mad Hasher Print E-mail

The Mad Hasher is a three piece Gtron Live Tool™. The Message and File Hasher returns a string containing the calculated message digest as lowercase hexits and a raw binary representation of the message digest. The Hash Benchmarker simply shows hash times based on a hashing algorithm with 32 bytes of data and over 1000 iterations.

Message Hasher Hash Benchmarker File Hasher (temporarily disabled)
What should we hash out together?

(message to be hashed)
and by what method shall we hash?

(hashing algorithm)

What FILE should we hash out together?

(FILE to be hashed)

and by what method shall we hash?

(hashing algorithm)

A hash function takes a string of any length as input and produces a fixed length string which acts as a kind of "signature" for the data provided. The practical intention is that a person knowing the hash, is unable to work out the original message, but someone knowing the original message can prove the hash is created from that message, and none other. A cryptographic hash function should behave as much as possible like a random function while still being deterministic and efficiently computable.

A cryptographic hash function is considered "insecure" from a cryptographic point of view, if either of the following is computationally feasible:

  • finding a (previously unseen) message that matches a given digest
  • finding "collisions", wherein two different messages have the same message digest.

An attacker who can do either of these things might, for example, use them to substitute an authorized message for an unauthorized one. Ideally, it should not even be feasible to find two messages whose digests are substantially similar; nor would one want an attacker to be able to learn anything useful about a message given only its digest. Of course the attacker learns at least one piece of information, the digest itself, which for instance gives the attacker the ability to recognise the same message should it occur again.

Currently supports: crc32(), crc32b, crc32, adler32, sha1(), md5(), md4, tiger128,3, tiger192,3, tiger160,3, md5, sha1, tiger128,4, tiger160,4, ripemd128, tiger192,4, ripemd256, ripemd160, sha256, ripemd320, haval192,3, haval128,3, haval160,3, haval224,3, haval256,3, haval128,4, haval160,4, haval224,4, haval256,4, haval192,4, haval128,5, haval192,5, haval160,5, haval224,5, gost, haval256,5, sha512, sha384, whirlpool, snefru, and md2