Hash

A hash function is any well-defined procedure or mathematical function that converts a large amount of data into a small datum, usually a single integer. For questions about the Twitter and Facebook # symbol, use hashtag

Md5

Cryptographic hash function with a 128-bit (16-byte) hash value

Sha1 sha256 algorithm

Quality Example
More robust

"All hash functions have that problem but some are more robust than md5"

from question "Hashing function guaranteed to be unique?"

Longer

"Because sha256 hash are much longer than md5 hash you can detect the hash algorithm by looking at the length of the hash"

from question "How to migrate from md5 to sha256 encryption"

Function more complex

"If the hash function is more complex and cryptographically strong md5 or sha1 then it is theoretically not possible"

from question "Calculating which strings will have the same hash"

Slower sha1

"Also the hash algorithm itself is much slower than sha1 md5 sha1 md5 are made for speed - not a useful property when storing passwords"

from question "Need Salted MD5 technique for login"

Bigger

"It s like complaining that a sha256 hash is bigger than an md5 hash - yep it is but only one of them might slow the attacker down for a while"

from question "Postgresql des encrypt"

Less likely

"Other hash functions such as sha-1 also have hash collisions although it is much less likely than md5"

from question "Is md5 an injective function?"

Faster

"This generally uses a hash algorithm that is much faster than md5"

from question "Adding keys to a list or collection - is there any value in hashing the key before adding it"

Stronger

"Use hash and choose hashing algorithm that suits you well if possible something stronger than md5 but don t go all the way to sha512 either"

from question "Crypt() not functioning as needed"

"Valid choices for hashing include sha1 or md5 although sha1 is preferable because it produces a larger hash and is considered cryptographically stronger than md5"

from question "ASP.NET machineKey config section default location"

Faster other

"In that case some hash functions are somewhat faster than other md5 being one of the fast functions but md4 is faster and it is simple enough that its code can be included in any application without much hassle"

from question "A suitable hash function to detect data corruption / check for data integrity?"

Larger

"Any hash function like md5 sha1 sha256 etc obviously cannot be 100 unique - because they have a fixed length and due to the there must necessarily be non-unique results for input content that is larger than the hash"

from question "How to generate a unique key for an array?"

"The difference between crc32 and md5 is that md5 generates a larger hash that s harder to predict"

from question "When is CRC more appropriate to use than MD5/SHA1?"

Better

"However if you want to use the sha256 hash alogorithm which is better than the md5 then here s a code sample"

from question "Silverlight MD5 implementation"

Safer

"Finally sha1 hash are safer than md5 i tell you that because you used the md5 tag in your post"

from question "Passing URL parameters with PHP"

Secure value clear

Quality Example
Much more

"Obviously md5 is much more difficult to reverse even in this anything that will hash to the right value sense then a simplistic algorithm like take the last two digits"

from question "How can it be impossible to "decrypt" an MD5 hash?"

"Using a non-reversible hash such as md5 is much more secure and you can store the hash value as clear text"

from question "Password encryption in Delphi"

Slower

"The fact that bcrypt produces hash slower than md5 because of security reasons is also clear for me"

from question "Store passwords securely in a medium load server"

Implementation significantly more secure

"The wrapper uses these in such a way that even the md5 implementation is significantly more secure than a simple hash"

from question "How can I vendorize bcrypt in a PHP application (and should I)?"

Much more secure

"With a salt md5 is much more secure than without but you re better off using one of the sha hash such as sha256managed"

from question "Is it safe to store passwords hashed with MD5CryptoServiceProvider in C#?"

Proven breakable worse

Quality Example
More reliable

"Sha-256 uses 64 characters in the database but with an index on the column that isn t a problem and it is a proven hash and more reliable than md5 and sha-1"

from question "What algorithm should I use to hash passwords into my database?"

Worse

"Mac os x llvm gcc based crypt fuction is borked junk hardwired to only use des a proven breakable hash worse than md5"

from question "How to get same crypt(3) function in Mac OS X as Linux gcc/gnu crypt(3)? Linux gcc crypt(3) has MD5 and SHA512. Apple Gcc crypt(3) *only* uses DES"

Others

Quality Example
Less cryptographically

"If you don t need the cryptographic properties then a non-cryptographic hash or a hash that is less cryptographically secure md5 being broken doesn t prevent it being a good hash nor still strong enough for some uses is likely to be more performant"

from question "Improve performance of SHA-1 ComputeHash"

Cake more complex

"The hash cake generates are more complex than md5"

from question "Cakephp login page doesn't go anywhere"

Longer

"So i guess it s the md5 in the dump output cause the conflicts and the hash value is longer than md5 outputs"

from question "How RPM detect conflicts?"

Less secure

"If you want to compare you re better off putting your result through getstring and compare the much less secure hash even less secure than md5 already is"

from question "How to reverse modified string back into MD5 hash given the method used to modify the string?"

No longer

"But if you still wish to figure out the phpbb password encryption hash it is no longer md5 in version 3.0 or higher and is a custom hash"

from question "How to get same password hash(md5()) as phpbb3"

Higher strength

"It is likely that you could do an sha hash of 100kb in well less than 10 second though and though sha-1 is still theoretically flawed it is of higher strength than md5"

from question "Which hash to use for file uniqueness in Java"

No longer secure

"Md5 is no longer secure and it can be broken with a good gpu no typo you can use your graphics card to break a hash"

from question "How exactly to implement Blowfish in php"

More compact

"I would like to apply a hash code solution on my webpage which is more compact than md5 and sha-1 because i want to use them as keys in a json hash table"

from question "Hash code which contains more than 16 characters?"

Stronger

"You can for example store a hash stored with something stronger than md5"

from question "How to make sure AJAX is called by JavaScript?"

Actually less

"Double md5 hashing is actually less secure than a single hash with some attack vectors"

from question "Encryption - does it work this way or am I thinking wrong?"

Better options

"Of course any hash algorithm is going to have some chance of collision but you have better options than md5 that would still satisfy the 1024-byte limit"

from question "URL representation"

Larger

"Hashing is one way you can prove this to yourself by taking an md5 or shasum of a large file since the file s size is larger than the hash output by pigeonhole principle hash can t be restored."

from question "Decryption of hashed passwords"

Better

"Or you could employ a request signing scheme in which certain request fields are hash together with the password of the user basically sending the password without sending the password similar to digest authentication but you can use something better than md5"

from question "Building a simple RESTful api"

Simply more expensive

"Crypt with hash is simply more expensive than md5"

from question "How are Crypt and Salt more secure than MD5 against a brute force attack?"

Back to Home
Data comes from Stack Exchange with CC-BY-SA-3.0