Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

You can use one of the following algorithms by setting the Algorithm parameter to the given algorithm name:

AlgorithmStrength
ADLER3232-bit
CRC332-bit
MD2128-bit
MD4128-bit
MD5128-bit
RIPEMD(same as RIPEMD-128)
RIPEMD-128128-bit
RIPEMD-160160-bit
RIPEMD-256256-bit
RIPEMD-360360-bit
SHA(same as SHA-1)
SHA-1160-bit
SHA-2(same as SHA-256)
SHA-224224-bit
SHA-256256-bit
SHA-384384-bit
SHA-512512-bit
TIGER192-bit
WHIRLPOOL512-bit

The green algorithms are useful for quick checksums, such as quickly verifying that a file hasn't been altered. They are not at all considered useful for security situations.

The red algorithms indicate weak algorithms. They While they are stronger than the green algorithms, they are no longer considered as secure as they used to be due to available cracks. They can still be useful is some situations, but avoid them if security is your top priority.

...