🟢SSH Hashs

Hash Algorithm
Description

MD5 (Message Digest 5)

A widely-used cryptographic hash function. MD5 is fast but considered weak due to vulnerabilities, making it less secure.

SHA-1 (Secure Hash Algorithm 1)

Another widely-used cryptographic hash function. SHA-1 is also considered weak due to vulnerabilities and is being phased out in favor of stronger hashes.

SHA-256 (Secure Hash Algorithm 256)

Part of the SHA-2 family, SHA-256 provides strong security with a 256-bit digest. It's widely used in SSH for data integrity.

SHA-384 (Secure Hash Algorithm 384)

Another member of the SHA-2 family, SHA-384 provides even stronger security with a 384-bit digest. It's used for high-security applications.

SHA-512 (Secure Hash Algorithm 512)

Part of the SHA-2 family, SHA-512 offers the highest level of security with a 512-bit digest. It's used in critical applications where strong security is essential.

SHA-3 (Secure Hash Algorithm 3)

A family of cryptographic hash functions designed to provide resistance to various types of attacks. It offers security and robustness.

HMAC (Hash-based Message Authentication Code)

A construction for creating a specific type of cryptographic hash that provides data integrity and authentication. It's commonly used in SSH for verifying data.

Last updated