Federal Agencies
Digitization Guidelines Initiative

Home > Glossary > H > Hash algorithm

Term: Hash algorithm

 “Search Glossary” button searches only the glossary. Temporary note: search not enabled for two- and three-character terms; browse by alphabet.
 “Search“ button at the top right of the page searches the Web site, not the glossary.

Suggest a term

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Term: Hash algorithm

A hash algorithm is a function that converts a data string into a numeric string output of fixed length. The output string is generally much smaller than the original data. Hash algorithms are designed to be collision-resistant, meaning that there is a very low probability that the same string would be created for different data. Two of the most common hash algorithms are the MD5 (Message-Digest algorithm 5) and the SHA-1 (Secure Hash Algorithm). MD5 Message Digest checksums are commonly used to validate data integrity when digital files are transferred or stored.
See also:
MD5 (checksum)