ONLINE HASH GENERATOR TIGER160,4
Source string specification form
Specify the source string in this form, then click on the button GENERATE
Result Form
This form will show the result of generating the source string in TIGER160,4
WHAT IS A HASHING ALGORITHM A TIGER160,4
TIGER160.4 is resistant to various types of attacks such as collision attacks and preprocessing attacks, making it a good choice for data integrity protection in various applications such as email, databases and file systems. However, please note that TIGER160.4 is considered obsolete and is not currently recommended for use in new applications. Instead, more modern hashing algorithms such as SHA-256 and SHA-3 are often used to protect data integrity.
TIGER160,4 is a cryptographic hashing algorithm that is used to calculate the checksum of a fixed length message. It was developed by cryptographers from Infineon Technologies AG in 1995.
The TIGER160.4 algorithm works with messages up to 2^64 bits in length (that is, up to 2^61 bytes). It takes a message as input and returns a 160-bit checksum as a sequence of 20 bytes.