How to Create Checksums with GtkHash

GtkHash is a small desktop application that creates multiple types of checksums on Linux and Windows at once. GtkHash can also hash multiple files at once or text strings. This makes hashing faster for users on Windows, macOS, and Linux who do not use the command line interface often.

Remember to follow best practices for using checksums and how to troubleshoot reasons your checksum doesn’t match the original.

Download GtkHash from your Linux package manager or Github.com.

Below we cover settings and how to hash a single file, file list, and text string.

Preferences

GtkHash opens to show the single file section. The default hash functions are MD5, SHA1, SHA256, and CRC32.

You can change the used hash functions and digest format in the top navigation bar > Edit > Preferences.

Change shown hash functions in GtkHash
GtkHash has over a dozen hashing algorithms

Hash a File

  1. Click the folder icon beside File:
  2. Open a file to hash
  3. Add an expected checksum beside Check: if available
  4. Select HMAC Key and add one if necessary
  5. Select Hash
Checksums for a test file in GtkHash
Simply choose a file and click Hash

Hash a File List

  1. To hash multiple files, select View > File List from the top navigation menu
  2. Select + Add
  3. Open files you want to hash
  4. Once you’ve added all files, select Hash
  5. Scroll right to see other hashes
Hashing multiple files at once in GtkHash
Easily hash multiple files at once in GtkHash

Hash a Text String

  1. To hash text, select View > Text from the top navigation menu
  2. Type text and the checksum will change in real time
  3. Add an expected checksum or HMAC Key if needed
Hashing a text string in GtkHash
Text checksums are updated instantly in GtkHash

Saving Hashes

  1. To save visible hash results, select File > Save As from the top navigation menu
  2. Specify a file name and Save

The text will resemble this format:

# MD5
19c68ed164b4d31b36c5d80c3ecee0b0 test-1.txt
# SHA256
fb57e94e58b0323798b5f9b75f9a394f54a7047c3733db6d5548e2de116c3ebb test-1.txt
# SHA384
573c6d01e2fcdd9280eee7bca12e665912dea5a1afb731dc6e59737136821dbf108f11f802abf1a3bf7b6b0771f8d48b test-1.txt
# SHA512
7af8387fb92c8b511565d66cff8316914540bb5ab391d237b309e52d41e20365838ff70b57b993eb6a5e227bd38e3b977214c8353bdd41897786411e8ebf844c test-1.txt
# SHA3-512
137c370cdb53a1a04b11fe0fb09c8076b0049d204f31ab321bbdae276d444a9180f545028aace7f4b84818e57d29d4d6e9f601c3431bd725f3aa44d5cece63ad test-1.txt

Are you looking for other ways to improve your privacy online? Check out these related technical articles and blogs for better cybersecurity.

Ask how to enhance your server security with our Managed VPS Hosting.

Was this article helpful? Let us know!