This tool works for standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed or not.
Uses Keywords: Computer Security, Cryptography, Message Digest, Hash Function, Hash algorithm, Secure Hash Standard.
When a message of any length less than 264 bits (for SHA-1, SHA-256) or less than 2128 bits (for SHA-512) is input to a hash algorithm, the result is an output called a message digest. Secure hash algorithms are typically used with other cryptographic algorithms Like MD4, MD5, RIPE MD160 such as digital signature algorithms and keyed-hash message authentication codes, or in the generation of random numbers (bits).