Introduction

Cryptographic hash functions are very interesting creatures as they allow us to turn text and binary strings into hash values of a fixed size with a minimal number of collisions (meaning two strings that result in the same hash value). The string we enter into this hash function may be smaller or even considerably larger than the resulting hash value.

Supported algorithms

The following hash functions are currently supported: Adler-32, CRC32, CRC32C, Keccak-224, Keccak-256, Keccak-384, MD4, MD5, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SM3, and Whirlpool.

Implementation of this operation

This operation uses the hash-wasm library for browsers and Node.js. It is licensed by MIT and is using hand-tuned WebAssembly binaries to calculate hashes lightning-fast. Star their GitHub repository to give them some love.

Resources