logo

ilovehash.dev

  • Bookmarks
  • Compare
Star on GitHub
  1. Home
  2. Categories

Hash Categories

Explore different families of cryptographic and non-cryptographic hash algorithms

Use Cases

Categories organized by application and security requirements

Cryptographic
→

Secure hash functions for cryptographic applications including digital signatures, certificates, blockchain, and secure communications.

High security, collision resistance, preimage resistance
16 algorithms
View category →
Checksum
→

Error-detection algorithms for verifying data integrity. Includes CRC variants, Fletcher checksums, and other validation methods.

Error detection, fast, various bit lengths
13 algorithms
View category →
Password
→

Specialized hash functions designed for password hashing with features like salt support and intentionally slow computation.

Password security, salt support, computational hardness
5 algorithms
View category →
Similarity
→

Locality-sensitive hash functions used for similarity detection, duplicate finding, and nearest neighbor searches.

Similarity detection, probabilistic, specialized use cases
6 algorithms
View category →
Non-cryptographic
→

Fast hash functions designed for non-cryptographic purposes like hash tables, checksums, and data integrity verification.

High speed, good distribution, non-cryptographic
26 algorithms
View category →

Algorithm Families

Categories organized by cryptographic standards and security levels

SHA-2
→

Modern cryptographic hash functions recommended for security applications. Includes SHA-256, SHA-384, and SHA-512 with truncated variants.

High security, standardized, widely adopted
6 algorithms
View category →
SHA-3
→

Next-generation cryptographic hash functions based on the Keccak algorithm. Offers better security margins and flexible output sizes.

Future-proof, quantum-resistant design, extendable output
4 algorithms
View category →
BLAKE2
→

High-performance cryptographic hash functions optimized for speed while maintaining security. Excellent for performance-critical applications.

Fast, secure, customizable output size
2 algorithms
View category →
SHAKE
→

Extendable-output functions (XOF) from the SHA-3 family. Can produce hash outputs of any desired length.

Variable output length, SHA-3 based, flexible
2 algorithms
View category →
Modern
→

Next-generation hash functions with improved security and performance characteristics compared to older standards.

Latest technology, enhanced security, optimized
20 algorithms
View category →
logoilovehash.dev

Compute and verify cryptographic hashes. No data stored.

Quick Links

  • Home
  • Categories
  • GitHub

Categories

  • BLAKE2
  • Checksum
  • Cryptographic
  • Modern
  • Non-cryptographic
  • Password

Categories

  • SHA-2
  • SHA-3
  • SHAKE
  • Similarity

Connect

GitHub
Theme

© 2026 ilovehash.dev. All rights reserved.

Built with Next.js & shadcn/ui•Powered by Node.js & Vercel