Select Algorithm: Text to hash:

Managed


Hash string:
String Length:

Service Provider:


Hash string:
String Length:

CNG:


Hash string:
String Length:

Notes:

This page visually demonstrates the SHA hashing algorithms as well as ones I found on the Internet.

Managed

Uses the managed library.

Service Provider

Uses the implementation provided by the cryptographic service provider (CSP).

CNG

Uses Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA).



© Michael Damron 2023