Hash-Managament
Attention!!
This feature is implemented in the Professional and C/S versions only.
Which hash algorithm has to be used in a scan/search, must be specified before the scan in the database options (window - Database options and tools).
Hash algorithms and hash sets
Hash algorithms |
10 different algorithms are available. MD5 and Keccak 512 are enabled by default. |
Activate hash generation |
Button to enable algorithms |
Import CRC32 hash set(s) importieren |
Ability to import hash sets (such as CRC32, Keccak-512 etc.) |
Plain or CSV |
Hash set will be imported (plain or via CSV). A window opens, where the file - and other import options as well - may be selected |
Export |
Select the folder, where the hash set has to be exported |
Hash algorithmus (yellow part) |
Analysis to the processed data |
Hash tree storage (automatic backup) |
|
SERVER-connection |
Input of the server connection data |
Hash algorithms, which may be used in DoublePics:
Algorithm |
Description |
MD5 |
Message-Digest Algorithm 5 (MD5) is a widely used cryptographic hash function that generates a 128-bit hash value from any message. This allows - for example - checking the correctness of downloads easily. |
Keccak-512 |
Keccak is a hash function, which was selected as SHA-3 standard (SHA = Secure Hash Algorithm) in October 2012 by the National Institute of Standards and Technology (NIST). (Source: http://www.secupedia.info/wiki/ Keccak # ixzz48QQGVnXI) |
CRC32 |
The cyclic redundancy check (CRC) is a method for determining a check value for data to detect errors in transmission or storage . |
eD2k |
Many programs, such as eMule, MLDonkey and the original eDonkey2000 client can be used to find, upload and download files on the eDonkey network. The files are available on the computers of other network nodes, who can upload these files to interested parties. Files are uniquely identified by their eD2k hash. Because the hash sum remains the same, even if a file is renamed, this identification is more reliable than - for example - identification by name. |
RIPEMD-160 |
RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest) is a cryptographic hash function with an output of 160 bits. |
SHA-1 |
The term secure hash algorithm (SHA) refers to a group of standardized cryptologic hash functions. These are used to calculate a unique check value for any digital data (messages) and are the basis for creating digital signatures. |
SHA-256 |
SHA-2 is the generic term for the four cryptologic hash functions SHA-224, SHA-256, SHA-384 and SHA-512, which were standardized by the US NIST as the follower/child from 2001 SHA-1 (the appended number indicates the length of the hash value in bits). |
SHA-384 |
s. SHA-256 |
SHA-512 |
s. SHA-256 |
Whirlpool |
WHIRLPOOL is a cryptologic hash function, which is named after the whirlpool galaxy in the constellation of the Hunting Dogs. Whirlpool works with files up to a size of 2256 bits and return a hash value of 512 bits. |