Hash | Candidate Types |
---|---|
{{ row.hash }} | {{ c.name }} — |
{{ jsonPretty }}
Cryptographic hash functions transform arbitrary-size data into a deterministic, fixed-length digest that appears random and cannot feasibly be reversed. Because every algorithm—MD5, SHA-1, SHA-256, bcrypt, and many more—produces a distinct output length or structural pattern, hashes underpin data-integrity verification, password storage, and digital-forensics chain-of-custody workflows across industry and academia worldwide today.
This identifier scans every digest you paste or upload, measures its character count, analyses allowed symbols, and checks known prefix signatures. A lightweight reactive engine then matches those traits against a curated catalogue of algorithms, returning a ranked list of candidates per line instantly on the same page, entirely offline.
For example, when investigating a leaked credential dump, you can quickly determine whether the vendor used MD5, SHA-1, or a modern memory-hard scheme before selecting an appropriate cracking, migration, or mitigation strategy. This accelerates incident-response timelines and reduces guesswork during forensic triage. Always corroborate the suggestion with context such as salting policies or storage metadata.
Hash-type detection rests on observable invariants. Each cryptographic algorithm emits a digest whose length, allowed alphabet, and sometimes a version prefix remain constant whatever the input. Evaluating these invariants lets you classify the algorithm without owning the plaintext or performing the hash operation. The method is deterministic, computationally negligible, and suitable for air-gapped or low-power devices. Pattern rules such as length-32 hexadecimal, 60-character bcrypt with “$2b$”, or 22-symbol Base64 strings map directly onto MD5, bcrypt, and Base64-MD5, enabling instant classification.
h
.L = |h|
.C
(hexadecimal, Base64, modular-crypt).$2b$
”.Algorithm | Digest Length (chars) | Distinctive Pattern |
---|---|---|
MD5 | 32 | Hex only |
SHA-1 | 40 | Hex only |
SHA-256 | 64 | Hex only |
SHA-512 | 128 | Hex only |
bcrypt | 60 | Prefix “$2a/b/y$” |
Argon2 | Variable | Prefix “$argon2i/d/id$” |
Algorithms sharing length but differing in prefix or allowed symbols still resolve unambiguously. When no pattern matches, the digest is labelled “Unknown”.
hash
.Given h = 5f4dcc3b5aa765d61d8327deb882cf99
:
No prefix detected; rule ⟨32, hex, ∅⟩ maps uniquely to MD5, so the candidate list contains only MD5
.
Pattern lengths originate from the defining specifications: RFC 1321 (MD5), FIPS 180-4 (SHA family), NIST SP 800-182 (bcrypt), and the Argon2 Internet Draft.
The tool processes only digest strings; no personal data or plaintext is required, aligning with GDPR’s data-minimisation principle.
Follow these simple steps to classify one or many digests.
.txt
file containing hashes.No. All processing happens locally; nothing leaves your browser.
The engine checks additional traits such as allowed symbols and mandatory prefixes to disambiguate.
Clone the source and extend the internal catalogue with new regular expressions.
No. It only classifies digest formats; cracking requires separate specialised software.
The digest may be corrupted, truncated, or generated by an unsupported algorithm.