Cryptographic hash function
A hash function maps data of arbitrary size to hash values, hash codes, digests, or simply hashes of fixed size.
Overview
Cryptographic hash functions are very interesting creatures as they allow us to turn text and binary strings into hash values of a fixed size with a minimal number of collisions (meaning two strings that result in the same hash value). The string we enter into this hash function may be smaller or even considerably larger than the resulting hash value.
Usage
The following hash functions are currently supported by the Hash function operation: Adler-32, CRC32, CRC32C, Keccak-224, Keccak-256, Keccak-384, MD4, MD5, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SM3, and Whirlpool.
Implementation
The hash function operation uses the JavaScript library hash-wasm. It is using WebAssembly binaries to efficiently calculate hashes.