Hash Calculator

Go to Product

The “Hash Calculator” node allows to calculate hash values aka. “digests” for given string or binary cells using various hash functions. Hash functions have a broad usage in information-security, e.g. for digital signatures, message authentication codes (MACs), and general authentication. Also they can be used to index data, create fingerprints, detect duplicates and uniquely identify files.

The following algorithms are currently supported out of the box (Provider “SUN”):

Additionally, the following hashing algorithms are provided via an extension point:

  • BC
    • 1.2.804.2.1.1.1.1.2.2.1
    • 1.2.804.2.1.1.1.1.2.2.2
    • 1.2.804.2.1.1.1.1.2.2.3
    • 2.16.840.1.101.3.4.2.10
    • 2.16.840.1.101.3.4.2.7
    • 2.16.840.1.101.3.4.2.8
    • 2.16.840.1.101.3.4.2.9
    • BLAKE2B-160
    • BLAKE2B-256
    • BLAKE2B-384
    • BLAKE2B-512
    • DSTU7564-256
    • DSTU7564-384
    • DSTU7564-512
    • GOST3411
    • GOST3411-2012-256
    • GOST3411-2012-512
    • KECCAK-224
    • KECCAK-256
    • KECCAK-288
    • KECCAK-384
    • KECCAK-512
    • MD2
    • MD4
    • MD5
    • OID.1.2.804.2.1.1.1.1.2.2.1
    • OID.1.2.804.2.1.1.1.1.2.2.2
    • OID.1.2.804.2.1.1.1.1.2.2.3
    • OID.2.16.840.1.101.3.4.2.10
    • OID.2.16.840.1.101.3.4.2.7
    • OID.2.16.840.1.101.3.4.2.8
    • OID.2.16.840.1.101.3.4.2.9
    • RIPEMD128
    • RIPEMD160
    • RIPEMD256
    • RIPEMD320
    • SHA-1
    • SHA-224
    • SHA-256
    • SHA-384
    • SHA-512
    • SHA-512/224
    • SHA-512/256
    • SHA3-224
    • SHA3-256
    • SHA3-384
    • SHA3-512
    • SM3
    • Skein-1024-1024
    • Skein-1024-384
    • Skein-1024-512
    • Skein-256-128
    • Skein-256-160
    • Skein-256-224
    • Skein-256-256
    • Skein-512-128
    • Skein-512-160
    • Skein-512-224
    • Skein-512-256
    • Skein-512-384
    • Skein-512-512
    • TIGER
    • WHIRLPOOL

The result is given in hexadecimal form. For example, the string “Lorem ipsum dolor sit amet” is transformed to an SHA hash 38f00f8738e241daea6f37f6f55ae8414d7b0219.

Input cannot only be provided as string data, but also as binary cell. In this case, the hashes are calculated in a streaming manner, which means, that hashes can also be calculated for binary data which exceed the amount of available memory.

Options

Input
The input column (string, binary, or file path) in the input table with values for for which to calculate hashes.
Remove input column
Enable to drop the input column from the result table.
Provider
The provider of the hash algorithms (defaults to “SUN” -- further can be added via an extension point).
Algorithm
The hashing algorithm to use, e.g. “SHA”.

Input Ports

Icon
Input table with a string or binary column for which to calculate hash codes.

Output Ports

Icon
Table with appended column holding the hash values in hex format.

Views

This node has no views

Workflows

Links

Developers

You want to see the source code for this node? Click the following button and we’ll use our super-powers to find it for you.