A comprehensive guide to checksums and file integrity verification. Learn when to use SHA-256 vs MD5, and how to verify downloads on any OS.
| Algorithm | Bits | Speed | Security | Use Case |
|---|---|---|---|---|
| MD5 | 128 | Very Fast | Broken (collisions known) | Legacy checksums, non-security file integrity |
| SHA-1 | 160 | Fast | Deprecated (collision demonstrated) | Legacy systems, Git object IDs |
| SHA-256 | 256 | Moderate | Strong — recommended | Software downloads, certificates, Docker images |
| SHA-512 | 512 | Moderate (faster on 64-bit CPUs) | Very Strong | High-security environments, password hashing inputs |
OS Commands
MD5
md5sum file.isomd5 file.isocertutil -hashfile file.iso MD5SHA-1
sha1sum file.isoshasum -a 1 file.isocertutil -hashfile file.iso SHA1SHA-256
sha256sum file.isoshasum -a 256 file.isocertutil -hashfile file.iso SHA256SHA-512
sha512sum file.isoshasum -a 512 file.isocertutil -hashfile file.iso SHA512marduc812
2026