Package Hash
Hashing algorithms
Hash functions take arbitrary strings as input, and produce an output
of fixed size that is dependent on the input; it should never be
possible to derive the input data given only the hash function's
output. Hash functions can be used simply as a checksum, or, in
association with a public-key algorithm, can be used to implement
digital signatures.
The hashing modules here all support the interface described in PEP
247, "API for Cryptographic Hash Functions".
Submodules:
- Crypto.Hash.HMAC
- RFC 2104. Keyed-Hashing for Message Authentication.
- Crypto.Hash.MD2
- RFC1319. Rivest's Message Digest algorithm, with a 128 bit digest. This algorithm is both slow and insecure.
- Crypto.Hash.MD4
- RFC1320. Rivest's Message Digest algorithm, with a 128 bit digest. This algorithm is insecure.
- Crypto.Hash.MD5
- RFC1321. Rivest's Message Digest algorithm, with a 128 bit digest. This algorithm is insecure.
- Crypto.Hash.RIPEMD
- RACE Integrity Primitives Evaluation Message Digest algorithm, with a 160 bit digest.
- Crypto.Hash.SHA
- Secure Hash Algorithm 1 (SHA-1), with a 160 bit digest. Published in FIPS PUB 180-1/2/3.
- Crypto.Hash.SHA224
- Secure Hash Algorithm 2 (SHA-2 family), with a 224 bit digest. Published in FIPS PUB 180-2/3.
- Crypto.Hash.SHA256
- Secure Hash Algorithm 2 (SHA-2 family), with a 256 bit digest. Published in FIPS PUB 180-2/3.
- Crypto.Hash.SHA384
- Secure Hash Algorithm 2 (SHA-2 family), with a 384 bit digest. Published in FIPS PUB 180-2/3.
- Crypto.Hash.SHA512
- Secure Hash Algorithm 2 (SHA-2 family), with a 512 bit digest. Published in FIPS PUB 180-2/3.
|
__revision__ = ' $Id$ '
|
|
__package__ = None
|