Contents 

QuickHash Library
QuickHash Library Overview
QuickHash Library Applications
QuickHash Library Installation
Register QuickHash Library
MD2
CMD2 ( C++ Interface )
CMD2 class members
MD2 API ( QuickHash API )
MD2 API Functions
MD2 ( QuickHash Type Library )
MD4
CMD4 ( C++ Interface )
CMD4 class members
MD4 API ( QuickHash API )
MD4 API Functions
MD4 ( QuickHash Type Library )
MD5
CMD5 ( C++ Interface )
CMD5 class members
MD5 API ( QuickHash API )
MD5 API Functions
MD5 ( QuickHash Type Library )
SHA-1
CSHA1 ( C++ Interface )
CSHA1 class members
SHA1 API ( QuickHash API )
SHA1 API Functions
SHA1 ( QuickHash Type Library )
SHA-2 (256)
CSHA256 ( C++ Interface )
CSHA256 class members
SHA256 API ( QuickHash API )
SHA256 API Functions
SHA256 ( QuickHash Type Library )
SHA-2 (384)
CSHA384 ( C++ Interface )
CSHA384 class members
SHA384 API ( QuickHash API )
SHA384 API Functions
SHA384 ( QuickHash Type Library )
SHA-2 (512)
CSHA512 ( C++ Interface )
CSHA512 class members
SHA512 API ( QuickHash API )
SHA512 API Functions
SHA512 ( QuickHash Type Library )
RIPEMD-128
CRIPEMD128 ( C++ Interface )
CRIPEMD128 ( C++ Interface )
RIPEMD128 API ( QuickHash API )
RIPEMD128 API Functions
RIPEMD128 ( QuickHash Type Library )
RIPEMD-160
CRIPEMD160 ( C++ Interface )
CRIPEMD160 ( C++ Interface )
RIPEMD160 API ( QuickHash API )
RIPEMD160 API Functions
RIPEMD160 ( QuickHash Type Library )
RIPEMD-256
CRIPEMD256 ( C++ Interface )
CRIPEMD256 ( C++ Interface )
RIPEMD256 API ( QuickHash API )
RIPEMD256 API Functions
RIPEMD256 ( QuickHash Type Library )
RIPEMD-320
CRIPEMD320 ( C++ Interface )
CRIPEMD320 ( C++ Interface )
RIPEMD320 API ( QuickHash API )
RIPEMD320 API Functions
RIPEMD320 ( QuickHash Type Library )
PANAMA
CPanama ( C++ Interface )
CPanama class members
PANAMA API ( QuickHash API )
PANAMA API Functions
PANAMA ( QuickHash Type Library )
TIGER
CTiger
CTiger class members
TIGER API ( QuickHash API )
TIGER API Functions
TIGER ( QuickHash Type Library )
CRC16
CCRC16 ( C++ Interface )
CCRC16 class members
CRC16 API ( QuickHash API )
CRC16 API Functions
CRC16 ( QuickHash Type Library )
CRC16C
CCRC16C ( C++ Interface )
CCRC16C class members
CRC16C API ( QuickHash API )
CRC16C API Functions
CRC16C ( QuickHash Type Library )
CRC32
CCRC32 ( C++ Interface )
CCRC32 class members
CRC32 API ( QuickHash API )
CRC32 API Functions
CRC32 ( QuickHash Type Library )
ADLER32
CAdler32 ( C++ Interface )
CAdler32 class members
ADLER32 API ( QuickHash API )
ADLER32 API Functions
ADLER32 ( QuickHash Type Library )
HMAC
CHMAC ( C++ Interface )
CHMAC class members
HMAC API ( QuickHash API )
HMAC API Functions
HMAC ( QuickHash Type Library )
QuickHash Type Library
Type Library Overview
Type Library Functions
Type Library Constants
Type Library Types
Type Library Error Codes
QuickHash Library Run-Time Dynamic Linking
Function Indicies in QuickHash.dll
License Agreement
Samples

SlavaSoft QuickHash Library Online Help

Prev Page Next Page
QuickHash Library  

QuickHash Library applications

QuickHash Library implements hash, checksum and HMAC algorithms. The most common applications of these algorithms are:

  • Data Integrity - The hash-value corresponding to a particular input is computed at some point in time. The integrity of this hash-value is protected in some manner. At a subsequent point in time, to verify that the input data has not been altered, the hash-value is recomputed using the input at hand, and compared for equality with the original hash-value; if they are equal, one accepts that the input has not been altered. The problem of checking the integrity of a potentially large input is thus reduced to that of a small fixed-size hash-value.

  • Password Protection - The hash-value corresponding to a particular password is computed and stored. To verify that a given password is equal to the original one, the hash-value for the given password is computed, and compared for equality with the stored hash-value of the original password; if they are equal, one accepts that the passwords are the same. This technique ensures that nobody can receive in any way and view one's passwords.

  • Key Derivation - Sequences of new keys are computed as hash-values from prior keys. In particular, this technique is often used for generating keys for private key encryption algorithms.

  • Keyed Random Number Generation - Sequences of new pseudorandom bytes are computed as hash-values from prior sequences. The initial sequence is the key of random number generator.

 

The hash, checksum and HMAC algorithms can also be used for data identification, software protection, software protection against viruses, computer files protection against tampering, protection against active spoofing, etc.

 

Note. Different applications require different properties of selected algorithms to be satisfied. That is why, to make the right choice when choosing the algorithm for your specific needs, we recommend you to consult additional sources of technical documentation. References and links to some of them can be found at Useful Links.

QuickHash Library Overview   |   Useful Links   |   HashCalc

 

See Also    QuickHash Library Installation, How to register QuickHash Library


 

 

Send Feedback to SlavaSoft Inc. Tell a friend about QuickHash Library