# Calculator Checksum + Online Solver With Free Steps

The Calculator Checksum generates a hash value (also known as a message digest) for the string value (usually a password) entered by the user. It provides an integer form and a hexadecimal form of the hash value generated for the string.

The message digest can be generated using two different hashing algorithms, MD5 and SHA-1. The MD5 generates a 120-bit hash value, and the SHA-1 generates a 160-bit hash value.

Additionally, in the case of saving passwords or data, the string (i.e. password) is converted into a hash value, using either of the two hashing algorithms, and stored in the database. When the user enters the password again, it will generate the hash and compares it with the stored hash. If it matches, the user’s password will be accepted.

## What Is the Calculator Checksum?

The Calculator Checksum is an online tool that creates message digest or hashes for a user input string, which is usually a password, to store in the server database. Furthermore, the data stored can be used as a reference when the user enters the same password to access the server, and the hash value generated from that input is compared with the saved hash value.

The Checksum Calculator has a simple interface consisting of a single-line text box with a dropdown option between the MD5 and SHA1 hashing algorithms. The input string can be of any size and can contain any word, but the message digest will always have a 128-bit size for MD5 and a 160-bit size for a SHA1 algorithm.

Moreover, this calculator does not give a hash value for the string “password” due to unknown circumstances. Also, the hash value is unique and can change even if you capitalize one letter of the string entered.

## How To Use the Calculator Checksum?

You can use the calculator by entering any word or phrase in the single-line text box. You can also find its hash value using this calculator checksum. Let us take the case of entering a string, “password1.”

### Step 1

Firstly, we need to ensure that the string you are entering is written correctly with no unwanted spaces and that the characters are properly entered.

### Step 2

Afterward, we select the type of hashing algorithm we want to use from the drop-down menu. You can select either the MD5 or SHA1 algorithm. In our case, we choose the SHA1 algorithm.

### Step 3

Finally, press the “hash” button to get the message digest.

### Results

A window popup shows the hashed value of the entered string value. This value is under the section called “Message digest.” This hash value is shown in two forms: Integer form and hexadecimal form. The integer form contains the hash in a set of integer numbers, whereas the hexadecimal form has the hash in the set of hexadecimal values.

## How Does the Calculator Checksum Work?

The Calculator Checksum works by using the concept of “checksum,” which is a small-sized block of data, and the hashing algorithms SHA1 and MD5.

### Definition

A checksum is a small-sized block of data generated from another block of digital data to identify faults introduced during transmission or storage. Checksums are frequently used to verify data integrity but are not used to validate data authenticity. A checksum function or checksum algorithm is the technique that creates this checksum.

A good checksum algorithm generally generates a considerably varied result depending on its design goals, even for minor changes to the input. Thus, the string value needs to be the same when verifying the data integrity.

The Secure Hash Algorithm 1 (SHA-1) is a computer security algorithm that uses cryptography. SHA-1 generates a 160-bit hash value or message digests from the inputted data (data that requires encryption), which is similar to the MD5 hash value. It is found as insecure nowadays.

The MD5 (message-digest algorithm) hashing method is a one-way cryptographic function that accepts any length message as input and produces a 128-bit value that may be used to authenticate the original message as output.

### Applications

The hash functions mentioned above are used for the following applications:

1. Verifying that the file downloaded is intact and there is no loss in data during transmission. By comparing the hash values of both files, we can verify the file integrity.
2. Used to convert passwords into a set of hash values, which is hidden from the site owner. This can be used as a reference check for another login attempt.

## Solved Examples

### Example 1

Consider a string value “Plague1337” entered as a password. Find its hash value given that the hashing algorithm used is SHA1.

### Solution

The string value “Plague1337” is hashed using the Calculator Checksum with the SHA1 algorithm. We enter this string value in the single-line text box as given and select the SHA1 option from the dropdown menu. The hashed values are given as below:

• Integer form: 493 083 852 246 453 415 877 621 569 330 767 341 535 080 623 471
• Hexadecimal form: 565e a506 fe55 9ad1 80b2 e390 6c78 e157 316a 2d6f

### Example 2

Consider a string value “-_-W-_-#” entered as a password. Find its hash value given that the hashing algorithm used is MD5.

### Solution

The string value “-_-W-_-#” is hashed using the Calculator Checksum with the MD5 algorithm. We enter this string value in the single-line text box as given and select the MD5 option from the dropdown menu. The hashed values are given as below:

• Integer form: 322 914 098 679 952 879 626 396 657 230 852 818 972
• Hexadecimal form: f2ee fe43 17bc 3f8f 0fc2 0817 a87a 881c

Consider a string value “#tewF$all” entered as a password. Find its hash value given that the hashing algorithm used is SHA1. ### Solution The string value “#tewF$all” is hashed using the Calculator Checksum with the SHA1 algorithm. We enter this string value in the single-line text box as given and select the SHA1 option from the dropdown menu. The hashed values are given as below:

• Integer form: 1 306 455 961 097 040 631 402 300 981 156 777 986 998. 578 183 182
• Hexadecimal form: e4d7 82ec ab4f 9f7f 6779 b159 c3b9 d766 7a2f fc0e