blob: 312d7e6960853b45ffa4f027008098088aac30d2 [file] [log] [blame]
Alex Gaynoraf82d5e2013-10-29 17:07:24 -07001.. hazmat::
Donald Stufftd8f01182013-10-27 16:59:56 -04002
Donald Stuffte51fb932013-10-27 17:26:17 -04003Message Digests
4===============
5
Donald Stufftf04317a2013-10-27 16:44:30 -04006.. currentmodule:: cryptography.hazmat.primitives.hashes
David Reid1f3d7182013-10-22 16:55:18 -07007
David Reidef0fcf22013-11-06 11:12:45 -08008.. class:: Hash(algorithm, backend)
Matthew Iversen505491b2013-10-19 15:56:17 +11009
David Reid55602982013-11-01 13:34:05 -070010 A cryptographic hash function takes an arbitrary block of data and
11 calculates a fixed-size bit string (a digest), such that different data
12 results (with a high probability) in different digests.
Matthew Iversen505491b2013-10-19 15:56:17 +110013
David Reid55602982013-11-01 13:34:05 -070014 This is an implementation of
Alex Gaynorab5f0112013-11-08 10:34:00 -080015 :class:`~cryptography.hazmat.primitives.interfaces.HashContext` meant to
David Reid55602982013-11-01 13:34:05 -070016 be used with
Alex Gaynorab5f0112013-11-08 10:34:00 -080017 :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm`
David Reid55602982013-11-01 13:34:05 -070018 implementations to provide an incremental interface to calculating
19 various message digests.
Alex Gaynor23d01a22013-10-28 10:14:46 -070020
21 .. doctest::
David Reid846460a2013-11-06 11:24:50 -080022
David Reidef0fcf22013-11-06 11:12:45 -080023 >>> from cryptography.hazmat.bindings import default_backend
Alex Gaynor23d01a22013-10-28 10:14:46 -070024 >>> from cryptography.hazmat.primitives import hashes
David Reid63fa19a2013-11-20 10:49:13 -080025 >>> digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
Alex Gaynor23d01a22013-10-28 10:14:46 -070026 >>> digest.update(b"abc")
27 >>> digest.update(b"123")
David Reid30b16132013-10-31 13:37:24 -070028 >>> digest.finalize()
29 'l\xa1=R\xcap\xc8\x83\xe0\xf0\xbb\x10\x1eBZ\x89\xe8bM\xe5\x1d\xb2\xd29%\x93\xafj\x84\x11\x80\x90'
Alex Gaynorf3b06cd2013-10-21 21:49:50 -070030
Alex Gaynor94801292013-11-13 10:33:01 -080031 Keep in mind that attacks against cryptographic hashes only get stronger
32 with time, and that often algorithms that were once thought to be strong,
33 become broken. Because of this it's important to include a plan for
34 upgrading the hash algorithm you use over time. For more information, see
35 `Lifetimes of cryptographic hash functions`_.
36
David Reid663295d2013-11-20 13:55:08 -080037 :param algorithm: A
38 :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm`
39 provider such as those described in
40 :ref:`below <cryptographic-hash-algorithms>`.
41 :param backend: A
42 :class:`~cryptography.hazmat.bindings.interfaces.HashBackend`
43 provider.
44
Paul Kehrer6b9ddeb2013-10-19 12:28:15 -050045 .. method:: update(data)
Matthew Iversen505491b2013-10-19 15:56:17 +110046
Alex Gaynorddc62f02013-10-20 06:14:24 -070047 :param bytes data: The bytes you wish to hash.
David Reid6392a9c2013-11-13 10:01:15 -080048 :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize`
Matthew Iversen505491b2013-10-19 15:56:17 +110049
50 .. method:: copy()
51
David Reid6392a9c2013-11-13 10:01:15 -080052 Copy this :class:`Hash` instance, usually so that we may call
53 :meth:`finalize` and get an intermediate digest value while we continue
54 to call :meth:`update` on the original.
55
56 :return: A new instance of :class:`Hash` which can be updated
57 and finalized independently of the original instance.
58 :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize`
Matthew Iversen505491b2013-10-19 15:56:17 +110059
David Reid30b16132013-10-31 13:37:24 -070060 .. method:: finalize()
Alex Gaynor14968452013-11-01 14:05:14 -070061
David Reid55602982013-11-01 13:34:05 -070062 Finalize the current context and return the message digest as bytes.
63
David Reid6392a9c2013-11-13 10:01:15 -080064 Once ``finalize`` is called this object can no longer be used and
Alex Gaynor272d5372013-11-13 13:50:02 -080065 :meth:`update`, :meth:`copy`, and :meth:`finalize` will raise
David Reid6392a9c2013-11-13 10:01:15 -080066 :class:`~cryptography.exceptions.AlreadyFinalized`.
Matthew Iversen505491b2013-10-19 15:56:17 +110067
68 :return bytes: The message digest as bytes.
69
Matthew Iversen505491b2013-10-19 15:56:17 +110070
David Reid663295d2013-11-20 13:55:08 -080071.. _cryptographic-hash-algorithms:
72
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050073SHA-1
Matthew Iversen505491b2013-10-19 15:56:17 +110074~~~~~
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050075
76.. attention::
77
78 NIST has deprecated SHA-1 in favor of the SHA-2 variants. New applications
79 are strongly suggested to use SHA-2 over SHA-1.
80
David Reid1f3d7182013-10-22 16:55:18 -070081.. class:: SHA1()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050082
83 SHA-1 is a cryptographic hash function standardized by NIST. It has a
84 160-bit message digest.
85
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050086SHA-2 Family
Matthew Iversen505491b2013-10-19 15:56:17 +110087~~~~~~~~~~~~
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050088
David Reid1f3d7182013-10-22 16:55:18 -070089.. class:: SHA224()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050090
91 SHA-224 is a cryptographic hash function from the SHA-2 family and
92 standardized by NIST. It has a 224-bit message digest.
93
David Reid1f3d7182013-10-22 16:55:18 -070094.. class:: SHA256()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -050095
96 SHA-256 is a cryptographic hash function from the SHA-2 family and
97 standardized by NIST. It has a 256-bit message digest.
98
David Reid1f3d7182013-10-22 16:55:18 -070099.. class:: SHA384()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500100
101 SHA-384 is a cryptographic hash function from the SHA-2 family and
102 standardized by NIST. It has a 384-bit message digest.
103
David Reid1f3d7182013-10-22 16:55:18 -0700104.. class:: SHA512()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500105
106 SHA-512 is a cryptographic hash function from the SHA-2 family and
107 standardized by NIST. It has a 512-bit message digest.
108
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500109RIPEMD160
Matthew Iversen505491b2013-10-19 15:56:17 +1100110~~~~~~~~~
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500111
David Reid1f3d7182013-10-22 16:55:18 -0700112.. class:: RIPEMD160()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500113
114 RIPEMD160 is a cryptographic hash function that is part of ISO/IEC
115 10118-3:2004. It has a 160-bit message digest.
116
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500117Whirlpool
Matthew Iversen505491b2013-10-19 15:56:17 +1100118~~~~~~~~~
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500119
David Reid1f3d7182013-10-22 16:55:18 -0700120.. class:: Whirlpool()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500121
122 Whirlpool is a cryptographic hash function that is part of ISO/IEC
123 10118-3:2004. It has a 512-bit message digest.
124
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500125MD5
Matthew Iversen505491b2013-10-19 15:56:17 +1100126~~~
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500127
128.. warning::
129
130 MD5 is a deprecated hash algorithm that has practical known collision
Alex Gaynorab5f0112013-11-08 10:34:00 -0800131 attacks. You are strongly discouraged from using it. Existing applications
132 should strongly consider moving away.
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500133
David Reid1f3d7182013-10-22 16:55:18 -0700134.. class:: MD5()
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500135
Paul Kehrer2b9b3012013-10-22 17:09:38 -0500136 MD5 is a deprecated cryptographic hash function. It has a 128-bit message
Paul Kehrer36e7d0d2013-10-18 18:54:40 -0500137 digest and has practical known collision attacks.
Alex Gaynor94801292013-11-13 10:33:01 -0800138
139
140.. _`Lifetimes of cryptographic hash functions`: http://valerieaurora.org/hash.html