Page History
...
You can use one of the following algorithms by setting the Algorithm parameter to the given algorithm name:
Algorithm | Strength |
---|---|
ADLER32 | 32-bit |
CRC3 | 32-bit |
MD2 | 128-bit |
MD4 | 128-bit |
MD5 | 128-bit |
RIPEMD | (same as RIPEMD-128) |
RIPEMD-128 | 128-bit |
RIPEMD-160 | 160-bit |
RIPEMD-256 | 256-bit |
RIPEMD-360 | 360-bit |
SHA | (same as SHA-1) |
SHA-1 | 160-bit |
SHA-2 | (same as SHA-256) |
SHA-224 | 224-bit |
SHA-256 | 256-bit |
SHA-384 | 384-bit |
SHA-512 | 512-bit |
TIGER | 192-bit |
WHIRLPOOL | 512-bit |
The green algorithms are useful for quick checksums, such as quickly verifying that a file hasn't been altered. They are not at all considered useful for security situations.
The red algorithms indicate weak algorithms. They While they are stronger than the green algorithms, they are no longer considered as secure as they used to be due to available cracks. They can still be useful is some situations, but avoid them if security is your top priority.
...