{"id":5371,"date":"2025-04-01T08:51:29","date_gmt":"2025-04-01T08:51:29","guid":{"rendered":"https:\/\/www.it-connect.tech\/?p=5371"},"modified":"2025-04-10T08:16:57","modified_gmt":"2025-04-10T08:16:57","slug":"linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512","status":"publish","type":"post","link":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/","title":{"rendered":"Linux: \u00bfc\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">I. Presentaci\u00f3n<\/h2>\n\n\n\n<p><strong>En este tutorial, aprenderemos a calcular una huella digital SHA-1, SHA-256 o SHA-512 en Linux.<\/strong> Este m\u00e9todo permite calcular y comprobar la huella digital de un archivo o una cadena de caracteres mediante tres comandos dedicados, disponibles en la mayor\u00eda de los sistemas Linux.<\/p>\n\n\n\n<p>El algoritmo hash SHA-1 no es ni el m\u00e1s reciente ni el m\u00e1s robusto. Aunque es m\u00e1s seguro que el conocido MD5, actualmente se prefiere a SHA-256 o incluso SHA-512. Estos \u00faltimos generan huellas digitales con m\u00e1s bits, 256 (32 bytes) y 512 bits (64 bytes) respectivamente, frente a los 160 bits de SHA-1. <strong>Esto las hace m\u00e1s robustas y reduce el riesgo de colisiones.<\/strong>  <\/p>\n\n\n\n<p>Por esta raz\u00f3n, SHA-256 y SHA-512 son los preferidos en la actualidad. Sin embargo, no son infalibles y podr\u00edan ser vulnerables a largo plazo a los avances en criptoan\u00e1lisis y computaci\u00f3n cu\u00e1ntica. <\/p>\n\n\n\n<p><strong>Pero, \u00bfqu\u00e9 es una huella y por qu\u00e9 es tan importante? Empecemos con un breve recordatorio. <\/strong><\/p>\n\n\n\n<p><em>Versi\u00f3n original del art\u00edculo: 03 de abril de 2013.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">II. Recordatorio: \u00bfqu\u00e9 es un hash? <\/h2>\n\n\n\n<p>Un hash, tambi\u00e9n conocido como huella criptogr\u00e1fica o <em>suma de comprobaci\u00f3n<\/em>, es <strong>una secuencia \u00fanica de caracteres generada a partir de una pieza de datos<\/strong> (un texto o un archivo)<strong>.<\/strong> Se utiliza para <strong>comprobar la integridad de un archivo o texto<\/strong>: si cambia un solo bit, el hash ser\u00e1 completamente diferente.<\/p>\n\n\n\n<p>Las comprobaciones de integridad se utilizan en muchos contextos, <strong>pero principalmente con fines de <a class=\"wpil_keyword_link\" href=\"https:\/\/www.it-connect.fr\/cours-tutoriels\/securite-informatique\/\" target=\"_blank\" rel=\"noopener\" title=\"ciberseguridad\" data-wpil-keyword-link=\"linked\" data-wpil-monitor-id=\"651\">ciberseguridad<\/a><\/strong>. Su objetivo es comprobar<strong> que un archivo no ha sido modificado<\/strong> desde una \u00faltima situaci\u00f3n conocida, o <strong>que no ha sido alterado<\/strong> durante su transferencia. Al igual que nuestras huellas dactilares, <strong>se supone que la huella de un archivo es \u00fanica<\/strong>.  <\/p>\n\n\n\n<p>Ahora que hemos tenido un r\u00e1pido recordatorio, veamos c\u00f3mo comprobar la huella digital de un archivo en <a class=\"wpil_keyword_link\" href=\"https:\/\/www.it-connect.fr\/cours-tutoriels\/administration-systemes\/linux\/\" target=\"_blank\" rel=\"noopener\" title=\"Linux\" data-wpil-keyword-link=\"linked\" data-wpil-monitor-id=\"652\">Linux<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">III. Uso de los comandos shaXsum para calcular una huella en Linux <\/h2>\n\n\n\n<p>Vamos a utilizar los comandos <code>sha1sum<\/code>, <code>sha256sum<\/code> y <code>sha512sum<\/code> para generar las huellas dactilares de un archivo en Linux. Esto permitir\u00e1 utilizar algoritmos SHA-1, SHA-256 o SHA-512, dependiendo de la aplicaci\u00f3n.  <strong>La elecci\u00f3n del algoritmo puede guiarse por los requisitos de seguridad y rendimiento.<\/strong><\/p>\n\n\n\n<p>He aqu\u00ed algunos ejemplos pr\u00e1cticos de c\u00f3mo calcular la huella digital de un archivo utilizando los algoritmos hash SHA-1, SHA-256 y SHA-512:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\"># <\/mark>Calcular la huella SHA-1 de un fichero\n$ <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">sha1sum<\/mark><\/strong> document.txt\n3d2636af5068b1af3199ee1d3f3796a348339d2f  document.txt\n\n<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\"># <\/mark>Calcular la huella SHA-256 de un fichero\n$ <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">sha256sum<\/mark><\/strong> document.txt\n12a1f36c7d1b4ece74ce916e126d99515b750c3066e08ef3536e14cefde42108  document.txt\n\n<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\"># <\/mark>Calcular la huella SHA-512 de un fichero\n$ <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">sha512sum<\/mark><\/strong> document.txt\n8ca31053f0349f3161980db84e97462e0e263b69de3740c6cac5aa6d66f96943cfe2953904cb8c515be847a755cd563ada3698ff515667a936355db820303696  document.txt<\/code><\/pre>\n\n\n\n<p>Como puedes ver, los hashes producidos son de diferentes longitudes y estos tres comandos se utilizan de la misma manera. Podemos, por ejemplo, utilizarlos para comprobar la integridad de dos o m\u00e1s archivos, en particular para compararlos :  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-multiple-fichiers.png\"><img decoding=\"async\" src=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-multiple-fichiers-800x128.png\" alt=\"C\u00e1lculo de las huellas SHA-256 de tres archivos en Linux.\" class=\"wp-image-95552\"\/><\/a><figcaption class=\"wp-element-caption\">C\u00e1lculo de las huellas SHA-256 de tres archivos en Linux.<\/figcaption><\/figure>\n\n\n\n<p>En este ejemplo, en el que utilizamos SHA-256, <strong>los dos primeros archivos son id\u00e9nticos (se ha generado el mismo hash SHA-256), pero el tercero es diferente<\/strong>.<\/p>\n\n\n\n<p>Tambi\u00e9n puede guardar esta huella en un archivo para que los usuarios puedan volver a compararla. Por lo general, las huellas digitales se guardan en un archivo con la extensi\u00f3n <code>.checksum<\/code> : <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sha256sum document.txt\n12a1f36c7d1b4ece74ce916e126d99515b750c3066e08ef3536e14cefde42108 <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">&gt; documents.txt.checksum<\/mark><\/strong><\/code><\/pre>\n\n\n\n<p>Por \u00faltimo, podemos calcular la huella digital de una cadena de caracteres de la siguiente manera:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ echo \"Se trata de una cadena de caracteres.\" | sha256sum \n151c792da29674e1f697191ef58544a18943395b86b33c211aafddffa2cbce83  -<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">IV. Comprobaci\u00f3n de la integridad de un fichero en Linux  <\/h2>\n\n\n\n<p>Ahora vamos a intentar una peque\u00f1a comprobaci\u00f3n de integridad utilizando uno de los tres comandos que acabamos de ver. Ve a la p\u00e1gina de <a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">descargas de VirtualBox<\/a> y descarga cualquier versi\u00f3n del instalador:  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-exemple-virtualbox.png\"><img decoding=\"async\" src=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-exemple-virtualbox-800x543.png\" alt=\"Descarga el instalador de VirtualBox.\" class=\"wp-image-95553\"\/><\/a><figcaption class=\"wp-element-caption\">Descarga el instalador de VirtualBox.<\/figcaption><\/figure>\n\n\n\n<p>Tambi\u00e9n encontrar\u00e1 un enlace \"<strong>Sumas de comprobaci\u00f3n SHA256<\/strong>\", que contiene los hashes de cada uno de los archivos ofrecidos. Por ejemplo, he descargado el instalador de Windows, cuya <em>suma de comprobaci\u00f3n<\/em> es <code>35c42c98b784974a965c358a9bda63b6cb4edde80db83f87daa2fee83e6cfad6<\/code>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-checksum-virtualbox.png\"><img decoding=\"async\" src=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-checksum-virtualbox-800x349.png\" alt=\"Recuperaci\u00f3n de la huella digital del archivo descargado.\" class=\"wp-image-95554\"\/><\/a><figcaption class=\"wp-element-caption\">Recuperaci\u00f3n de la huella digital del archivo descargado.<\/figcaption><\/figure>\n\n\n\n<p>Una vez descargado el archivo, compruebo su integridad con el comando <code>sha256sum<\/code> : <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-checksum-virtualbox-1.png\"><img decoding=\"async\" src=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/linux-calculer-integrite-empreinte-hash-sha256-sha512-checksum-virtualbox-1-800x59.png\" alt=\"Comprueba la integridad del archivo descargado a trav\u00e9s de su huella SHA-256.\" class=\"wp-image-95555\"\/><\/a><figcaption class=\"wp-element-caption\">Comprueba la integridad del archivo descargado a trav\u00e9s de su huella SHA-256.<\/figcaption><\/figure>\n\n\n\n<p>Las huellas SHA-256 son las mismas. De esto puedo concluir que el archivo est\u00e1 intacto, lo que confirma que no fue alterado durante la transferencia. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">V. Conclusi\u00f3n<\/h2>\n\n\n\n<p>Ahora puede calcular de forma sencilla la huella digital SHA1, SHA-256 y SHA-512 de un archivo o cadena de caracteres. Esto puede resultar especialmente \u00fatil para calcular la integridad de un archivo. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aprenda a calcular una huella digital SHA-1, SHA-256 y SHA-512 en Linux con los comandos sha1sum, sha256sum y sha512sum. \u00a1Una gu\u00eda r\u00e1pida y pr\u00e1ctica! <\/p>\n","protected":false},"author":3,"featured_media":5378,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25],"tags":[],"class_list":["post-5371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux"],"acf":{"hreflang_fr":"https:\/\/www.it-connect.fr\/calculer-une-empreinte-sha1-sous-linux\/"},"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Micka\u00ebl Dorigny\"\/>\n\t<meta name=\"google-site-verification\" content=\"ZA5wDx6z10dkUAOeNgJmYDQP4pE2hlMb0pmDKXfWk9U\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"es_ES\" \/>\n\t\t<meta property=\"og:site_name\" content=\"IT-Connect -\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512\" \/>\n\t\t<meta property=\"og:description\" content=\"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-04-01T08:51:29+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2025-04-10T08:16:57+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/it.connect.fr\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@itconnect_fr\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@Ogma_Sec\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#blogposting\",\"name\":\"Linux : c\\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512\",\"headline\":\"Linux: \\u00bfc\\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?\",\"author\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/author\\\/mickael-dorigny\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png\",\"width\":800,\"height\":445,\"caption\":\"Calcular-una-huella-Sha-X-Familiarizarse-con-Linux\"},\"datePublished\":\"2025-04-01T08:51:29+00:00\",\"dateModified\":\"2025-04-10T08:16:57+00:00\",\"inLanguage\":\"es-ES\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#webpage\"},\"articleSection\":\"Linux, Opcional\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/#listItem\",\"name\":\"Cursos - Tutoriales\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/#listItem\",\"position\":2,\"name\":\"Cursos - Tutoriales\",\"item\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/#listItem\",\"name\":\"Administraci\\u00f3n del sistema\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/#listItem\",\"position\":3,\"name\":\"Administraci\\u00f3n del sistema\",\"item\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/linux\\\/#listItem\",\"name\":\"Linux\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/#listItem\",\"name\":\"Cursos - Tutoriales\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/linux\\\/#listItem\",\"position\":4,\"name\":\"Linux\",\"item\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/linux\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#listItem\",\"name\":\"Linux: \\u00bfc\\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/#listItem\",\"name\":\"Administraci\\u00f3n del sistema\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#listItem\",\"position\":5,\"name\":\"Linux: \\u00bfc\\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/cursos-tutoriales\\\/administracion-del-sistema\\\/linux\\\/#listItem\",\"name\":\"Linux\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#organization\",\"name\":\"IT-Connect\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Logo-IT-Connect-Tech.png\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#organizationLogo\",\"width\":270,\"height\":43},\"image\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/it.connect.fr\\\/\",\"https:\\\/\\\/twitter.com\\\/itconnect_fr\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCIJTq0nGrgkGMy1xJL_YppQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/it-connect-fr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/author\\\/mickael-dorigny\\\/#author\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/author\\\/mickael-dorigny\\\/\",\"name\":\"Micka\\u00ebl Dorigny\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/wp-content\\\/litespeed\\\/avatar\\\/ee3c2e9792288ecb7d44c6fd18ada067.jpg?ver=1777898895\"},\"sameAs\":[\"https:\\\/\\\/twitter.com\\\/Ogma_Sec\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mickael-dorigny-b9b07048\\\/\"],\"jobTitle\":\"Co-founder\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#webpage\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/\",\"name\":\"Linux : c\\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512\",\"description\":\"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!\",\"inLanguage\":\"es-ES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/author\\\/mickael-dorigny\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/author\\\/mickael-dorigny\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#mainImage\",\"width\":800,\"height\":445,\"caption\":\"Calcular-una-huella-Sha-X-Familiarizarse-con-Linux\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\\\/#mainImage\"},\"datePublished\":\"2025-04-01T08:51:29+00:00\",\"dateModified\":\"2025-04-10T08:16:57+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/\",\"name\":\"IT-Connect\",\"inLanguage\":\"es-ES\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.it-connect.tech\\\/es\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512<\/title>\n\n","aioseo_head_json":{"title":"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512","description":"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!","canonical_url":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"google-site-verification":"ZA5wDx6z10dkUAOeNgJmYDQP4pE2hlMb0pmDKXfWk9U","miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#blogposting","name":"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512","headline":"Linux: \u00bfc\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?","author":{"@id":"https:\/\/www.it-connect.tech\/es\/author\/mickael-dorigny\/#author"},"publisher":{"@id":"https:\/\/www.it-connect.tech\/es\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png","width":800,"height":445,"caption":"Calcular-una-huella-Sha-X-Familiarizarse-con-Linux"},"datePublished":"2025-04-01T08:51:29+00:00","dateModified":"2025-04-10T08:16:57+00:00","inLanguage":"es-ES","mainEntityOfPage":{"@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#webpage"},"isPartOf":{"@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#webpage"},"articleSection":"Linux, Opcional"},{"@type":"BreadcrumbList","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/#listItem","position":1,"name":"Home","item":"https:\/\/www.it-connect.tech\/es\/","nextItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/#listItem","name":"Cursos - Tutoriales"}},{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/#listItem","position":2,"name":"Cursos - Tutoriales","item":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/","nextItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/#listItem","name":"Administraci\u00f3n del sistema"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/#listItem","position":3,"name":"Administraci\u00f3n del sistema","item":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/","nextItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/linux\/#listItem","name":"Linux"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/#listItem","name":"Cursos - Tutoriales"}},{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/linux\/#listItem","position":4,"name":"Linux","item":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/linux\/","nextItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#listItem","name":"Linux: \u00bfc\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/#listItem","name":"Administraci\u00f3n del sistema"}},{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#listItem","position":5,"name":"Linux: \u00bfc\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?","previousItem":{"@type":"ListItem","@id":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/linux\/#listItem","name":"Linux"}}]},{"@type":"Organization","@id":"https:\/\/www.it-connect.tech\/es\/#organization","name":"IT-Connect","url":"https:\/\/www.it-connect.tech\/es\/","logo":{"@type":"ImageObject","url":"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/02\/cropped-Logo-IT-Connect-Tech.png","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#organizationLogo","width":270,"height":43},"image":{"@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/it.connect.fr\/","https:\/\/twitter.com\/itconnect_fr","https:\/\/www.youtube.com\/channel\/UCIJTq0nGrgkGMy1xJL_YppQ","https:\/\/www.linkedin.com\/company\/it-connect-fr"]},{"@type":"Person","@id":"https:\/\/www.it-connect.tech\/es\/author\/mickael-dorigny\/#author","url":"https:\/\/www.it-connect.tech\/es\/author\/mickael-dorigny\/","name":"Micka\u00ebl Dorigny","image":{"@type":"ImageObject","url":"https:\/\/www.it-connect.tech\/wp-content\/litespeed\/avatar\/ee3c2e9792288ecb7d44c6fd18ada067.jpg?ver=1777898895"},"sameAs":["https:\/\/twitter.com\/Ogma_Sec","https:\/\/www.linkedin.com\/in\/mickael-dorigny-b9b07048\/"],"jobTitle":"Co-founder"},{"@type":"WebPage","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#webpage","url":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/","name":"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512","description":"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!","inLanguage":"es-ES","isPartOf":{"@id":"https:\/\/www.it-connect.tech\/es\/#website"},"breadcrumb":{"@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#breadcrumblist"},"author":{"@id":"https:\/\/www.it-connect.tech\/es\/author\/mickael-dorigny\/#author"},"creator":{"@id":"https:\/\/www.it-connect.tech\/es\/author\/mickael-dorigny\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png","@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#mainImage","width":800,"height":445,"caption":"Calcular-una-huella-Sha-X-Familiarizarse-con-Linux"},"primaryImageOfPage":{"@id":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/#mainImage"},"datePublished":"2025-04-01T08:51:29+00:00","dateModified":"2025-04-10T08:16:57+00:00"},{"@type":"WebSite","@id":"https:\/\/www.it-connect.tech\/es\/#website","url":"https:\/\/www.it-connect.tech\/es\/","name":"IT-Connect","inLanguage":"es-ES","publisher":{"@id":"https:\/\/www.it-connect.tech\/es\/#organization"}}]},"og:locale":"es_ES","og:site_name":"IT-Connect -","og:type":"article","og:title":"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512","og:description":"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!","og:url":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/","og:image":"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png","og:image:secure_url":"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png","og:image:width":800,"og:image:height":445,"article:published_time":"2025-04-01T08:51:29+00:00","article:modified_time":"2025-04-10T08:16:57+00:00","article:publisher":"https:\/\/www.facebook.com\/it.connect.fr\/","twitter:card":"summary_large_image","twitter:site":"@itconnect_fr","twitter:title":"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512","twitter:description":"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!","twitter:creator":"@Ogma_Sec","twitter:image":"https:\/\/www.it-connect.tech\/wp-content\/uploads\/2025\/04\/Calcular-una-huella-Sha-X-Familiarizarse-con-Linux.png"},"aioseo_meta_data":{"post_id":"5371","title":"Linux : c\u00e1lculo de una huella digital SHA-1, SHA-256 y SHA-512","description":"Learn how to calculate an SHA-1, SHA-256 and SHA-512 fingerprint in Linux with the sha1sum, sha256sum and sha512sum commands - a quick and practical guide!","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-15 04:41:03","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2025-04-09 09:57:17","updated":"2025-08-15 04:41:03"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.it-connect.tech\/es\/\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/\" title=\"Cursos - Tutoriales\">Cursos - Tutoriales<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/\" title=\"Administraci\u00f3n del sistema\">Administraci\u00f3n del sistema<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/linux\/\" title=\"Linux\">Linux<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tLinux: \u00bfc\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.it-connect.tech\/es\/"},{"label":"Cursos - Tutoriales","link":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/"},{"label":"Administraci\u00f3n del sistema","link":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/"},{"label":"Linux","link":"https:\/\/www.it-connect.tech\/es\/cursos-tutoriales\/administracion-del-sistema\/linux\/"},{"label":"Linux: \u00bfc\u00f3mo calcular una huella digital SHA-1, SHA-256 y SHA-512?","link":"https:\/\/www.it-connect.tech\/es\/linux-como-calcular-una-huella-digital-sha-1-sha-256-y-sha-512\/"}],"_links":{"self":[{"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/posts\/5371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/comments?post=5371"}],"version-history":[{"count":2,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/posts\/5371\/revisions"}],"predecessor-version":[{"id":5396,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/posts\/5371\/revisions\/5396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/media\/5378"}],"wp:attachment":[{"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/media?parent=5371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/categories?post=5371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.it-connect.tech\/es\/wp-json\/wp\/v2\/tags?post=5371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}