Hash Algorithms
SHA-2, SHA-3, BLAKE and other hash algorithms
Hash algorithms are mathematical functions that convert data of any size into a fixed-length string of characters (hash). To make a simple analogy, a hash algorithm is like a fingerprint of data - the same data always produces the same hash, but it is nearly impossible to recover the original data from the hash. Due to this property, hash algorithms are widely used in data integrity checks, password storage, digital signatures, and blockchain technologies.
Use Cases
- Data integrity verification (file verification)
- Password storage and verification
- Blockchain and cryptocurrency technologies
- Digital signatures
- SSL/TLS certificates
- Database indexing
- Deduplication (duplicate data detection)
- One-way function (irreversible)
- Deterministic (same input = same output)
- Fast computation
- Collision resistance
- Avalanche effect (small change = completely different hash)
| Algorithm | Security | Speed | Use Cases |
|---|---|---|---|
| SHA-256 | Very High | Fast | BlockchainSSL/TLSDigital signatures |
| SHA-512 | Very High | Fast | High-security applicationsLarge file hashing |
| SHA3-256 | Very High | Medium | Modern security applicationsSHA-2 alternative |
| BLAKE3 | Very High | Very Fast | High-performance applicationsReal-time hashing |
| BLAKE2b | Very High | Fast | High-performance applications |
| BLAKE2s | Very High | Fast | High-performance applications |
| MD5 | Low | Very Fast | Checksum only (non-security)Not recommended for bare hashing; HMAC-SHA1 acceptable in certain compatibility scenarios |
| SHA-1 | Low | Very Fast | Not recommended for bare hashingHMAC-SHA1 acceptable in certain compatibility scenarios |
* Comparisons are relative to reference/hardware acceleration on 64-bit CPU
SHA-2 Family
Developed by NSA and standardized by NIST, the most widely used hash algorithm family today. Used in Bitcoin and many security protocols.
SHA-3 Family (NIST Standard)
Keccak-based modern hash algorithm family designed as the successor to SHA-2. Standardized by NIST. Uses a different mathematical structure.
Keccak (Not NIST Standard)
Original version of the Keccak algorithm. Uses different padding than SHA-3. Not a NIST standard, but used in some systems like Ethereum.
Legacy & Insecure
Older hash algorithms no longer considered secure. Used only for backward compatibility. Note: Not recommended for bare hashing; HMAC-SHA1 acceptable in certain compatibility scenarios.
Variable-Length Output (XOF)
Extendable Output Functions (XOF) - hash functions that can produce output of any desired length instead of fixed length.
Other Hash Algorithms
Other hash algorithms with specific use cases.
- • FIPS PUB 180-4
- • ISO/IEC 10118-3
- • RFC 6234