This operation allows you to hash data using the Keccak cryptographic hash algorithm. Keccak is the original algorithm that was standardized as SHA-3 by the National Institute of Standards and Technology (NIST). It is widely used in cryptographic applications, such as blockchain technologies (e.g., Ethereum).
These are the input/output expected data types for this operation:
These are the parameters you need to configure to use this operation (mandatory parameters are marked with a *):
Suppose you want to hash your input strings using the Keccak algorithm:
In your Pipeline, open the required Action configuration and select the input Field.
In the Operation field, choose Keccak.
Set Size to 256
.
Give your Output field a name and click Save. The strings in your input field will be hashed using the Keccak algorithm.
For example, the following string:
will be hashed as:
This operation allows you to hash data using the MD2 (Message Digest 2) algorithm. MD2 is a cryptographic hash function primarily intended for use in systems based on 8-bit computers. It produces a 128-bit hash value (16 bytes), typically represented as a 32-character hexadecimal string.
These are the input/output expected data types for this operation:
Suppose you want to hash your input strings using the MD2 algorithm:
In your Pipeline, open the required Action configuration and select the input Field.
In the Operation field, choose MD2.
Give your Output field a name and click Save. The strings in your input field will be hashed using the MD2 algorithm.
For example, the following string:
will be hashed as:
Loading...
Loading...
This operation is used to compute the SHA-0 hash of an input string. SHA-0 is a cryptographic hash function and a predecessor to the more widely known SHA-1.
These are the input/output expected data types for this operation:
Suppose you want to get the SHA0 hashes a series of strings in your input data:
In your Pipeline, open the required Action configuration and select the input Field.
In the Operation field, choose SHA0.
Give your Output field a name and click Save. You'll get the SHA0 hashes of your input strings.
For example:
This operation is used to compute the SHA-1 hash of a given input. SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function that produces a 160-bit (20-byte) hash value, typically represented as a 40-character hexadecimal string.
These are the input/output expected data types for this operation:
Suppose you want to get the SHA1 hashes a series of strings in your input data:
In your Pipeline, open the required Action configuration and select the input Field.
In the Operation field, choose SHA1.
Give your Output field a name and click Save. You'll get the SHA1 hashes of your input strings.
For example:
Loading...
Loading...
Loading...
Loading...