Hashing
Overview
This page contains recommendations for choosing a hashing algorithm.
General
If you need to hash passwords see the the Authentication: Password Storage page.
For other data, use a hashing algorithm from the
SHA-2
orSHA-3
family.Do not use vulnerable hashing algorithms from the list below. You can find examples of collision attacks at https://github.com/corkami/collisions.
Hashing implementation
Use the implementation of hash algorithms from the crypto package, such as crypto/sha256 or crypto/sha512. You can find the whole list at https://pkg.go.dev/crypto#Hash
Last updated