Hash & Checksum Generator - MD5, SHA, CRC, MurmurHash
Cryptographic Hash Functions
Hash functions transform input of any size into fixed-length output. They're one-way functions — you can't reverse them to find the original input. Hashes are fundamental to security, file verification, and data integrity.
Common Uses
File verification — Compare hashes to detect corrupted downloads or file tampering.
Password storage — Store hashes instead of passwords (with proper salting).
Data deduplication — Identify identical files without comparing full content.
Embedded systems — CRC8/16 for sensor data, serial protocols, and memory-constrained devices.
Algorithm Selection
For security: SHA-256/384/512 for file integrity and authentication.
For speed: MurmurHash, xxHash for hash tables and caching.
For embedded: CRC8 for Arduino, CRC16 for Modbus, CRC32 for files.
For legacy: MD5, MD2, MD4, Tiger, Whirlpool for older systems.