Skip to content

Hash

Computes a cryptographic hash for the given input.

The Hash node processes an input stream and computes a cryptographic hash using the specified algorithm. This node supports a variety of hash algorithms including SHA, MD5, CRC32, and BLAKE2B. The result is a unique fixed-size string that represents the input data, which is useful for verifying data integrity and for security purposes.

Inputs#

Port Description
Triggers the hashing process.
Algorithm
The hash algorithm to use.
Input

Outputs#

Port Description
Success
The hashing process completed successfully.
Error
There was an error during the hashing process.
Hash
The computed hash value.

Addendum#

These links provide detailed information and implementation guidance for each hash algorithm:

  1. SHA-1: SHA-1 - Wikipedia
  2. SHA-224, SHA-256, SHA-384, SHA-512: SHA-2 - Wikipedia
  3. SHA3-256, SHA3-384, SHA3-512: SHA-3 - Wikipedia
  4. MD5: MD5 - Wikipedia
  5. CRC32: Cyclic redundancy check - Wikipedia
  6. BLAKE2B-256, BLAKE2B-384, BLAKE2B-512: BLAKE (hash function) - Wikipedia

ID: hash@v1