Skip to content

Hash

Computes a hash for the given input data.

Computes a hash for an input data stream using a specified algorithm.

The node outputs a fixed-size hexadecimal string representing the input data. This is primarily used to verify data integrity.

Algorithm Security#

While all algorithms are suitable for integrity checks, their security for cryptographic purposes (like password hashing) varies:

Algorithm Family Security Status
CRC32 Not for security; for error detection only.
MD5, SHA-1 Considered insecure and deprecated for security.
SHA-2, SHA-3 Generally considered secure.
BLAKE2b Considered secure and often faster than SHA-2/3.

Inputs#

Port Description
Triggers the hashing process.
Algorithm
The hash algorithm to use.
Input
The input data stream to hash.

Outputs#

Port Description
Success
Executes if the hashing process is successful.
Error
Executes if an error occurs during the process.
Hash
The computed hash as a hexadecimal string.

Addendum#

For more technical details on each algorithm family, refer to their Wikipedia pages:

ID: core/hash@v1