A Kaleidoscope Toolbox

Not found tool? Make a request

Hashing

MD5

MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files

SHA1

The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.

SHA224

In February 2004, a change notice was issued for FIPS PUB 180-2 to include an additional variant SHA-224, which was defined to comply with the key length required for dual-key 3DES

SHA256

SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears to provide much better security.

SHA384

The five algorithms of the SHA family, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, were designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It's a U.S. government standard. The latter four are sometimes called SHA-2 together.

SHA512

SHA-512 is largely identical to SHA-256 but operates on 64-bit words rather than 32.

SHA3

SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64 competing designs were evaluated.

RIPEMD160

RIPEMD-160 is a modified version of MD4 that generates 20-byte digest values and is almost as secure as SHA-1 (note that the SHA-1 standard does not say how the K value is determined, which is very suspicious). RIPEMD-160 can be thought of as two MD4 computates in parallel, and if two threads are used, the performance will not be much different.

HmacMD5

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA1

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA224

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA256

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA384

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA512

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacRIPEMD160

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

PBKDF2

PBKDF2 is a password-based key derivation function. In many applications of cryptography, user security is ultimately dependent on a password, and because a password usually can't be used directly as a cryptographic key, some processing is required. A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.