Hashing in Crypto++
This posts explores the hashing algorithms available in Crypto++. We will examine how to use them
independently and how to integrate them into a pipeline. First, let's review the available
implementations. These are listed in the "Hash Functions" section of the documentation index.
Notable examples include Blake2s/2b, Keccak, and SHA3. Some algorithms, such as MD5 and MD4, are
located in the Weak
namespace. As the name implies, these are not secure for production use and
are included only for reference.