Hash
Computes a cryptographic hash for the given input.
The Hash node processes an input stream and computes a cryptographic hash using the specified algorithm. This node supports a variety of hash algorithms including SHA, MD5, CRC32, and BLAKE2B. The result is a unique fixed-size string that represents the input data, which is useful for verifying data integrity and for security purposes.
Inputs#
Port | Description |
---|---|
Triggers the hashing process. | |
The hash algorithm to use. | |
Outputs#
Port | Description |
---|---|
The hashing process completed successfully. | |
There was an error during the hashing process. | |
The computed hash value. |
Addendum#
These links provide detailed information and implementation guidance for each hash algorithm:
- SHA-1: SHA-1 - Wikipedia
- SHA-224, SHA-256, SHA-384, SHA-512: SHA-2 - Wikipedia
- SHA3-256, SHA3-384, SHA3-512: SHA-3 - Wikipedia
- MD5: MD5 - Wikipedia
- CRC32: Cyclic redundancy check - Wikipedia
- BLAKE2B-256, BLAKE2B-384, BLAKE2B-512: BLAKE (hash function) - Wikipedia
ID: hash@v1