New beta version 1.70 is available. For all details check the changelog.

New version 1.62 has been released. For all details check the changelog.

New version 1.60 has been released. For all details check the changelog.

New version 1.56 has been released. For all details check the changelog.

New version 1.54 has been released. For all details check the changelog.

2/4/2010 7:20 PM UTC
Hash Codes has the new website now. The web interface is now simply, nice and professional(?).

Next release will include German interface. Translation will be made by Christoph Schubert. If you would like to contribute a translation, please click here.

Welcome to Hash Codes website. I would like to share my freeware Hash Codes software with others. I hope that using the program will for anyone who is interested in an intuitive and simple. But if you will need help, please visit the help page. I hope you enjoy it.

What is the hash function?

A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value. The data to be encoded is often called the "message", and the hash value is sometimes called the message digest or simply digest.

The ideal cryptographic hash function has four main properties:

  • it is easy to compute the hash value for any given message,
  • it is infeasible to find a message that has a given hash,
  • it is infeasible to modify a message without changing its hash,
  • it is infeasible to find two different messages with the same hash.

Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, hash codes, hash sums, hash values, or simply hashes, even though all these terms stand for functions with rather different properties and purposes.

Want to be sure that your data has not been altered or damaged, earlier generate a hash code for them and at the right time (after copying) compare to find out they are identical.

Read more on Wikipedia.

Click here to show hash codes for ANSI text "Hash Codes".