logo

ilovehash.dev

  • Bookmarks
  • Compare
Star on GitHub
ilovehash.dev logo

ilovehash.dev

Compute, verify, and explore cryptographic hash functions.

Open source • Instant results • No data stored • Secure and private

Showing 100 of 100 hash algorithms
BLAKE2b-512
BLAKE2

Ultra-fast BLAKE2b-512 cryptographic hash with optional keying and personalization

Added: 2026-01-19
BLAKE2s-256
BLAKE2

Optimized BLAKE2s-256 hash for 32-bit platforms with excellent performance and security

Added: 2026-01-19
Adler-32
Checksum

Fast Adler-32 checksum used in zlib compression - optimized for speed over accuracy

Added: 2026-01-19
CRC-16
Checksum

Cyclic redundancy check (16-bit)

Added: 2026-01-19
CRC-32
Checksum

Standard CRC-32 checksum for ZIP files and Ethernet - detects accidental data corruption

Added: 2026-01-19
CRC-64
Checksum

Cyclic redundancy check (64-bit)

Added: 2026-01-19
CRC-8
Checksum

Cyclic redundancy check (8-bit)

Added: 2026-01-19
Damm Algorithm
Checksum

Damm algorithm - quasigroup-based checksum providing single-digit error correction

Added: 2026-01-19
Fletcher-16
Checksum

Standard Fletcher-16 checksum - widely used for network protocols and data integrity

Added: 2026-01-19
Fletcher-32
Checksum

Enhanced Fletcher-32 checksum - stronger error detection for larger data sets and files

Added: 2026-01-19
Fletcher-4
Checksum

Compact Fletcher-4 checksum - position-dependent error detection for small data blocks

Added: 2026-01-19
Fletcher-8
Checksum

Fletcher-8 checksum algorithm - efficient 8-bit error detection with burst error protection

Added: 2026-01-19
Internet Checksum
Checksum

RFC 1071 Internet checksum algorithm

Added: 2026-01-19
Luhn Algorithm
Checksum

Luhn algorithm - credit card validation checksum used worldwide for financial data integrity

Added: 2026-01-19
Verhoeff Algorithm
Checksum

Verhoeff algorithm - advanced decimal checksum with transposition error detection capabilities

Added: 2026-01-19
BLAKE-224
Cryptographic
Legacy

Legacy BLAKE-224 hash - predecessor to BLAKE2, use BLAKE2b or BLAKE3 for new applications

Added: 2026-01-19
BLAKE-256
Cryptographic
Legacy

Legacy BLAKE-256 hash - original SHA-3 finalist, prefer BLAKE2s or BLAKE3 for modern use

Added: 2026-01-19
BLAKE-384
Cryptographic
Legacy

Legacy BLAKE-384 hash - older standard, upgrade to BLAKE2b or BLAKE3 for better performance

Added: 2026-01-19
BLAKE-512
Cryptographic
Legacy

Legacy BLAKE-512 hash - SHA-3 finalist, replaced by faster BLAKE2b and BLAKE3 algorithms

Added: 2026-01-19
GOST
Cryptographic
Legacy

Russian GOST R 34.11-2012 cryptographic hash - government standard for Russian Federation

Added: 2026-01-19
HAS-160
Cryptographic
Legacy

Hash Algorithm Standard 160-bit

Added: 2026-01-19
Keccak-224
Cryptographic

Original Keccak-224 hash - foundation of SHA-3 standard for Ethereum and blockchain

Added: 2026-01-19
Keccak-256
Cryptographic

Keccak-256 hash algorithm used in Ethereum blockchain and cryptocurrency security

Added: 2026-01-19
Keccak-384
Cryptographic

High-security Keccak-384 cryptographic hash for advanced digital security applications

Added: 2026-01-19
Keccak-512
Cryptographic

Maximum-security Keccak-512 hash for large-scale data integrity and encryption

Added: 2026-01-19
MD2
Cryptographic
Legacy

Obsolete MD2 hash - cryptographically broken, avoid for any security-critical applications

Added: 2026-01-19
MD4
Cryptographic
Legacy

Deprecated MD4 hash - vulnerable to collision attacks, use SHA-256 or stronger alternatives

Added: 2026-01-19
MD5
Cryptographic
Legacy

Legacy MD5 hash - deprecated for security, use SHA-256 or BLAKE2 instead for any security needs

Added: 2026-01-19
RIPEMD-160
Cryptographic

European RIPEMD-160 cryptographic hash - alternative to SHA-1 for digital signatures

Added: 2026-01-19
SHA-1
Cryptographic
Legacy

Deprecated SHA-1 hash - cryptographically broken, use SHA-256 or SHA-3 for secure applications

Added: 2026-01-19
Streebog
Cryptographic
Legacy

Russian Streebog hash function - modern Russian cryptographic standard for digital signatures

Added: 2026-01-19
BLAKE3
Modern

Lightning-fast BLAKE3 cryptographic hash - 3x faster than BLAKE2 with parallel processing

Added: 2026-01-19
Blue Midnight Wish
Modern

Blue Midnight Wish hash - SHA-3 finalist with unique double-pipe construction for security

Added: 2026-01-19
CMAC
Modern

Cipher-based Message Authentication Code - standardized MAC using block ciphers like AES

Added: 2026-01-19
cSHAKE128
Modern

cSHAKE128 customizable XOF - domain-separated SHAKE128 for protocol customization and security

Added: 2026-01-19
cSHAKE256
Modern

cSHAKE256 customizable XOF - enhanced domain separation for cryptographic protocol design

Added: 2026-01-19
CubeHash
Modern

CubeHash cryptographic hash - SHA-3 finalist known for simple design and security margins

Added: 2026-01-19
ECHO
Modern

ECHO cryptographic hash - wide-pipe design for enhanced security against length extension attacks

Added: 2026-01-19
Grøstl
Modern

Grøstl cryptographic hash - AES-based design providing provable security and high performance

Added: 2026-01-19
HighwayHash
Modern

Google's HighwayHash - cryptographic hash optimized for speed while maintaining security guarantees

Added: 2026-01-19
HKDF
Modern

Secure HKDF key derivation - extracts strong keys from weak input material using HMAC

Added: 2026-01-19
HMAC
Modern

Cryptographic HMAC for message authentication - protects integrity and authenticity of data

Added: 2026-01-19
KangarooTwelve (128-bit)
Modern

KangarooTwelve tree hashing (128-bit output)

Added: 2026-01-19
KangarooTwelve (256-bit)
Modern

KangarooTwelve tree hashing (256-bit output)

Added: 2026-01-19
ParallelHash
Modern

ParallelHash for large data - high-performance parallel processing of massive datasets

Added: 2026-01-19
Poly1305
Modern

Poly1305 one-time authenticator - fast message authentication used in TLS and cryptography protocols

Added: 2026-01-19
SipHash
Modern

SipHash - cryptographically secure pseudorandom function designed to prevent hash flooding attacks

Added: 2026-01-19
Skein
Modern

Skein cryptographic hash - highly optimized for 64-bit platforms with tweakable parameters

Added: 2026-01-19
TupleHash
Modern

TupleHash for ordered sequences - secure hashing of structured data with tuple preservation

Added: 2026-01-19
TurboSHAKE128
Modern

TurboSHAKE128 with domain separation - optimized XOF for high-performance cryptographic applications

Added: 2026-01-19
TurboSHAKE256
Modern

TurboSHAKE256 with domain separation - high-security XOF for advanced cryptographic protocols

Added: 2026-01-19
AP Hash
Non-cryptographic

Arash Partow's hash function - optimized for speed and distribution in hash tables

Added: 2026-01-19
Bernstein Hash
Non-cryptographic

Daniel J. Bernstein's hash function

Added: 2026-01-19
BKDR Hash
Non-cryptographic

BKDR hash by Kernighan and Ritchie - classic string hashing from 'The C Programming Language'

Added: 2026-01-19
CityHash
Non-cryptographic

Google's CityHash - optimized for modern CPUs with SIMD instructions for maximum speed

Added: 2026-01-19
DEK Hash
Non-cryptographic

Donald Knuth's hash function - mathematical approach from 'The Art of Computer Programming'

Added: 2026-01-19
DJB2
Non-cryptographic

Classic djb2 hash by Daniel Bernstein - simple and fast for basic hash table applications

Added: 2026-01-19
ELF Hash
Non-cryptographic

Executable and Linkable Format hash (PJW hash)

Added: 2026-01-19
FarmHash
Non-cryptographic

Google's FarmHash - successor to CityHash with improved performance across all platforms

Added: 2026-01-19
FNV-1
Non-cryptographic

Classic FNV-1 hash - simple, fast non-cryptographic hash for general-purpose applications

Added: 2026-01-19
FNV-1 (64-bit)
Non-cryptographic

64-bit FNV-1 hash for modern systems - fast and reliable for 64-bit architectures

Added: 2026-01-19
FNV-1a
Non-cryptographic

Improved FNV-1a hash - better avalanche effect for hash tables and data deduplication

Added: 2026-01-19
FNV-1a (64-bit)
Non-cryptographic

64-bit FNV-1a hash - optimized avalanche properties for 64-bit computing platforms

Added: 2026-01-19
Jenkins One-at-a-Time
Non-cryptographic

Bob Jenkins' One-at-a-Time hash

Added: 2026-01-19
JS Hash
Non-cryptographic

Justin Sobel's hash function - simple multiplicative hash for basic applications

Added: 2026-01-19
MetroHash
Non-cryptographic

MetroHash - extremely fast hash function designed for high-throughput applications

Added: 2026-01-19
MurmurHash
Non-cryptographic

Popular MurmurHash algorithm - fast non-cryptographic hash for hash tables and cache keys

Added: 2026-01-19
MurmurHash128
Non-cryptographic

High-performance MurmurHash128 for 128-bit applications - excellent for large hash tables

Added: 2026-01-19
Pearson Hash
Non-cryptographic

Pearson hashing using lookup table

Added: 2026-01-19
RS Hash
Non-cryptographic

Robert Sedgwick's hash function - classic algorithm from 'Algorithms in C' textbook

Added: 2026-01-19
SDBM
Non-cryptographic

SDBM hash function - reliable non-cryptographic hash for general-purpose data structures

Added: 2026-01-19
T1HA
Non-cryptographic

Fast Positive Hash (T1HA) - one of the fastest non-cryptographic hashes available

Added: 2026-01-19
Tabulation Hash
Non-cryptographic

Tabulation hashing with high independence

Added: 2026-01-19
xxHash128
Non-cryptographic

High-performance xxHash128 for large-scale systems - fastest 128-bit hash for big data applications

Added: 2026-01-19
xxHash32
Non-cryptographic

Ultra-fast xxHash32 for high-performance applications - faster than CRC32 with better distribution

Added: 2026-01-19
xxHash64
Non-cryptographic

Industry-standard xxHash64 for databases and file systems - blazing fast with excellent collision resistance

Added: 2026-01-19
Zobrist Hash
Non-cryptographic

Zobrist hashing for board games

Added: 2026-01-19
Argon2d
Password

Memory-hard Argon2d password hashing - optimized for resistance to GPU cracking attacks

Added: 2026-01-19
Argon2i
Password

Advanced Argon2i password hashing - protects against side-channel attacks with memory hardness

Added: 2026-01-19
Argon2id
Password

Recommended Argon2id password hashing - hybrid approach for maximum security against all attacks

Added: 2026-01-19
PBKDF2
Password

Standard PBKDF2 password hashing - NIST-approved key derivation for secure password storage

Added: 2026-01-19
Scrypt
Password

Memory-hard Scrypt password hashing - protects against hardware-based cracking attacks

Added: 2026-01-19
SHA-224
SHA-2

Secure SHA-224 cryptographic hash for digital signatures and certificates

Added: 2026-01-19
SHA-256
SHA-2

Industry-standard SHA-256 secure hash for blockchain, TLS, and digital security

Added: 2026-01-19
SHA-384
SHA-2

High-security SHA-384 hash for government and enterprise cryptographic applications

Added: 2026-01-19
SHA-512
SHA-2

Powerful SHA-512 cryptographic hash for maximum security and large data integrity

Added: 2026-01-19
SHA-512/224
SHA-2

Truncated SHA-512/224 hash - secure 224-bit output from SHA-512 algorithm

Added: 2026-01-19
SHA-512/256
SHA-2

Truncated SHA-512/256 hash - secure 256-bit output from SHA-512 algorithm

Added: 2026-01-19
SHA-3-224
SHA-3

Next-generation SHA-3-224 cryptographic hash with quantum-resistant security

Added: 2026-01-19
SHA-3-256
SHA-3

Future-proof SHA-3-256 hash algorithm replacing SHA-2 for enhanced security

Added: 2026-01-19
SHA-3-384
SHA-3

High-security SHA-3-384 hash for government and critical infrastructure protection

Added: 2026-01-19
SHA-3-512
SHA-3

Maximum-security SHA-3-512 hash for large data integrity and digital signatures

Added: 2026-01-19
SHAKE128
SHAKE

Flexible SHAKE128 extendable-output function - generate hashes of any length securely

Added: 2026-01-19
SHAKE256
SHAKE

High-security SHAKE256 extendable-output function for customizable hash lengths

Added: 2026-01-19
b-bit MinHash
Similarity

Compact b-bit MinHash - memory-efficient similarity detection for large-scale applications

Added: 2026-01-19
I-Match
Similarity

I-Match lexicon-based similarity algorithm - customizable duplicate detection using word dictionaries

Added: 2026-01-19
MinHash
Similarity

MinHash for Jaccard similarity estimation - used in duplicate detection and recommendation systems

Added: 2026-01-19
Nilsimsa
Similarity

Nilsimsa hash for spam detection - specialized locality-sensitive hash for email and text analysis

Added: 2026-01-19
SimHash
Similarity

Locality-sensitive SimHash for document similarity - finds near-duplicate content efficiently

Added: 2026-01-19
SuperMinHash
Similarity

Enhanced SuperMinHash (2017) - improved accuracy over traditional MinHash for similarity search

Added: 2026-01-19

Ready to Hash?

Try computing a hash right now. Choose from various cryptographic hash algorithms. No data stored.

Try SHA-256Browse All Tools
logoilovehash.dev

Compute and verify cryptographic hashes. No data stored.

Quick Links

  • Home
  • Categories
  • GitHub

Categories

  • BLAKE2
  • Checksum
  • Cryptographic
  • Modern
  • Non-cryptographic
  • Password

Categories

  • SHA-2
  • SHA-3
  • SHAKE
  • Similarity

Connect

GitHub
Theme

© 2026 ilovehash.dev. All rights reserved.

Built with Next.js & shadcn/ui•Powered by Node.js & Vercel