-
Notifications
You must be signed in to change notification settings - Fork 5
Tutorial
Johann N. Löfflmann edited this page Jun 25, 2022
·
9 revisions
Hash functions play an important role in many cryptographic and non-cryptographic mechanisms, for example when verifying data integrity or identifying files. They map a bit string m ∈ {0, 1}* of arbitrary length to a bit string h ∈ {0, 1}n of fixed length n ∈ ℕ.
Jacksum 3.4.0 supports 472 hash functions, both cryptographic and non-cryptographic hash functions including CRCs and checksums.
The result of a hash function is the hash value.
- Manpage, section EXAMPLES
- Cheat-Sheet
Jacksum • https://jacksum.net • Jacksum on GitHub