tags:

views:

266

answers:

5

I seen MD5 and SHA1 hashes on the net to verify files. What are common hashes used on the net and other programs? This is to verify a file not to hash a pw.

A: 

I never used anything else than MD5. Add a Salt if you use it for passwords.

Lennart
+1  A: 

To verify files you can use cyclic redundancy checks, such as CRC32, which have been as far as I know the de-facto standard for hashing files for a long time in the IT, if you want to look at other stuff than MD5/SHA.

See also this list of checksum algorithms for more ways to check your files.

Kosi2801
Davy Landman
Ah, thx for the hint, I'll update immediately.
Kosi2801
Interestingly enough, Intel added a CRC32 instruction to SSE 4.2 so CRC lives on.
Hank Gay
@Hank Gay, crc32 is still used for certain low level protocols and is still useful, but not for files anymore.
Davy Landman
A: 

Wikipedia has a list of hash functions, broken up into different types (checksums, non-crypto, crypto etc).

Jon Skeet
A: 

The Apache Foundation (among others) uses PGP Signatures.

Hank Gay
+5  A: 

I've used some hash functions from the following site before - they are usually pretty quick, and full code is given on the website, and a description of each of the functions and their strengths/weaknesses:

http://www.partow.net/programming/hashfunctions

Examples of the hashes given are - Kernighan and Ritchie (from "The C Programming Language") and the Knuth hash (from "The Art Of Computer Programming Volume 3").

Andy Wyatt