Links
🟢

SSH Hashs

Hash Algorithm
Description
MD5 (Message Digest 5)
A widely-used cryptographic hash function. MD5 is fast but considered weak due to vulnerabilities, making it less secure.
SHA-1 (Secure Hash Algorithm 1)
Another widely-used cryptographic hash function. SHA-1 is also considered weak due to vulnerabilities and is being phased out in favor of stronger hashes.
SHA-256 (Secure Hash Algorithm 256)
Part of the SHA-2 family, SHA-256 provides strong security with a 256-bit digest. It's widely used in SSH for data integrity.
SHA-384 (Secure Hash Algorithm 384)
Another member of the SHA-2 family, SHA-384 provides even stronger security with a 384-bit digest. It's used for high-security applications.
SHA-512 (Secure Hash Algorithm 512)
Part of the SHA-2 family, SHA-512 offers the highest level of security with a 512-bit digest. It's used in critical applications where strong security is essential.
SHA-3 (Secure Hash Algorithm 3)
A family of cryptographic hash functions designed to provide resistance to various types of attacks. It offers security and robustness.
HMAC (Hash-based Message Authentication Code)
A construction for creating a specific type of cryptographic hash that provides data integrity and authentication. It's commonly used in SSH for verifying data.