Hash
Computes a hash for the given input data.
Computes a hash for an input data stream using a specified algorithm.
The node outputs a fixed-size hexadecimal string representing the input data. This is primarily used to verify data integrity.
Algorithm Security#
While all algorithms are suitable for integrity checks, their security for cryptographic purposes (like password hashing) varies:
| Algorithm Family | Security Status |
|---|---|
| CRC32 | Not for security; for error detection only. |
| MD5, SHA-1 | Considered insecure and deprecated for security. |
| SHA-2, SHA-3 | Generally considered secure. |
| BLAKE2b | Considered secure and often faster than SHA-2/3. |
Inputs#
| Port | Description |
|---|---|
| Triggers the hashing process. | |
| The hash algorithm to use. | |
| The input data stream to hash. |
Outputs#
| Port | Description |
|---|---|
| Executes if the hashing process is successful. | |
| Executes if an error occurs during the process. | |
| The computed hash as a hexadecimal string. |
Addendum#
For more technical details on each algorithm family, refer to their Wikipedia pages:
- SHA-1
- SHA-2 (includes SHA-224, SHA-256, SHA-384, SHA-512)
- SHA-3 (includes SHA3-256, SHA3-384, SHA3-512)
- MD5
- CRC (Cyclic Redundancy Check)
- BLAKE (includes BLAKE2b variants)
ID: core/hash@v1