Overview

Cryptographic hash functions are very interesting creatures as they allow us to turn text and binary strings into hash values of a fixed size with a minimal number of collisions (meaning two strings that result in the same hash value). The string we enter into this hash function may be smaller or even considerably larger than the resulting hash value.

Usage

The following hash functions are currently supported by the Hash function operation: Adler-32, CRC32, CRC32C, Keccak-224, Keccak-256, Keccak-384, MD4, MD5, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SM3, and Whirlpool.

Implementation

The hash function operation uses the JavaScript library hash-wasm. It is using WebAssembly binaries to efficiently calculate hashes.

See also

Resources