Digital Signature & Hash Verifier
Secure, client-side cryptographic tool for verifying file integrity using MD5, SHA-256, SHA-512, and RSA signatures. Features bulk verification, visual hash identicons, and audit generation.
About
In the era of supply chain attacks and compromised download mirrors, Trustless Verification is not a luxury - it is a necessity. This tool provides a mathematically rigorous environment to validate the integrity of digital assets without ever exposing them to a remote server.
Unlike basic checksum tools, this application utilizes the browser's native SubtleCrypto API to perform high-performance hashing and asymmetric signature verification directly on your device CPU. It addresses the critical need for verifying software binaries, legal documents, and sensitive archives against tampering.
We support legacy algorithms like MD5 for historical compatibility, alongside modern standards like SHA-256 and SHA-512. The integrated Visual Hash system converts cryptographic digests into geometric identicons, allowing human operators to recognize mismatched files instantaneously via pattern recognition rather than purely alphanumeric comparison.
Formulas
The core mechanism of file integrity relies on one-way compression functions. For a message M, the hash H is defined as:
In the case of Digital Signatures (e.g., RSA), verification involves the signer's Public Key (PK), the Signature (S), and the message (M). The verification function Verify returns a boolean:
Where Dec is the decryption operation using the public key. This ensures non-repudiation and integrity.
Reference Data
| Algorithm | Output Size (Bits) | Block Size (Bits) | Collision Resistance | Primary Use Case |
|---|---|---|---|---|
| MD5 | 128 | 512 | BROKEN | Legacy checksums, non-crypto integrity |
| SHA-1 | 160 | 512 | WEAK | Git commits, legacy SSL (Deprecated) |
| SHA-256 | 256 | 512 | STRONG | Bitcoin, TLS, Software Signing |
| SHA-384 | 384 | 1024 | STRONG | High-security government usage |
| SHA-512 | 512 | 1024 | STRONG | Archival integrity, top-secret clearance |
| RSA-PSS | Key Dependent | Key Dependent | STRONG | Asymmetric digital signatures |