Hash-Managament

Attention!!

This feature is implemented in the Professional and C/S versions only.

Which hash algorithm has to be used in a scan/search, must be specified before the scan in the database options (window - Database options and tools).

Hash algorithms and hash sets

images/download/attachments/3440661/hashalgsets_engl.png

Hash algorithms

10 different algorithms are available. MD5 and Keccak 512 are enabled by default.

Activate hash generation

Button to enable algorithms

Import CRC32 hash set(s) importieren

Ability to import hash sets (such as CRC32, Keccak-512 etc.)

Plain or CSV

Hash set will be imported (plain or via CSV). A window opens, where the file - and other import options as well - may be selected

Export

Select the folder, where the hash set has to be exported

Hash algorithmus (yellow part)

Analysis to the processed data

Hash tree storage (automatic backup)

 

SERVER-connection

Input of the server connection data

Hash algorithms, which may be used in DoublePics:

Algorithm

Description

MD5

Message-Digest Algorithm 5 (MD5) is a widely used cryptographic hash function that generates a 128-bit hash value from any message. This allows - for example - checking the correctness of downloads easily.

Keccak-512

Keccak is a hash function, which was selected as SHA-3 standard (SHA = Secure Hash Algorithm) in October 2012 by the National Institute of Standards and Technology (NIST). (Source: http://www.secupedia.info/wiki/ Keccak # ixzz48QQGVnXI)

CRC32

The cyclic redundancy check (CRC) is a method for determining a check value for data to detect errors in transmission or storage .

eD2k

Many programs, such as eMule, MLDonkey and the original eDonkey2000 client can be used to find, upload and download files on the eDonkey network. The files are available on the computers of other network nodes, who can upload these files to interested parties. Files are uniquely identified by their eD2k hash. Because the hash sum remains the same, even if a file is renamed, this identification is more reliable than - for example - identification by name.

RIPEMD-160

RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest) is a cryptographic hash function with an output of 160 bits.

SHA-1

The term secure hash algorithm (SHA) refers to a group of standardized cryptologic hash functions. These are used to calculate a unique check value for any digital data (messages) and are the basis for creating digital signatures.

SHA-256

SHA-2 is the generic term for the four cryptologic hash functions SHA-224, SHA-256, SHA-384 and SHA-512, which were standardized by the US NIST as the follower/child from 2001 SHA-1 (the appended number indicates the length of the hash value in bits).

SHA-384

s. SHA-256

SHA-512

s. SHA-256

Whirlpool

WHIRLPOOL is a cryptologic hash function, which is named after the whirlpool galaxy in the constellation of the Hunting Dogs. Whirlpool works with files up to a size of 2256 bits and return a hash value of 512 bits.