A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value. The data to be encoded is often called the "message", and the hash value is sometimes called the message digest or simply digest.
The ideal cryptographic hash function has four main properties:
it is easy to compute the hash value for any given message,
it is infeasible to find a message that has a given hash,
it is infeasible to modify a message without changing its hash,
it is infeasible to find two different messages with the same hash.
Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (Macs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to Detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic hash values are sometimes called (digital) Fingerprints, checksums, hash codes, hash sums, hash values, or simply hashes, even though all these terms stand for functions with rather different properties and purposes.
Want to be sure that your data has not been altered or damaged, earlier generate a hash code for them and at the right time (after copying) compare to find out they are identical.
Features:
Hash data from keyboard, file or CD/DVD
Uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 and Whirlpool Algorithm
Copy hash codes to clipboard or save to disk
Can compare hash codes
Load saved hash code file to comparison
Progress bar show the current process
Suspend, resume or stop the hash process
Save log information