Generate cryptographic hashes with MD5, SHA-1, SHA-256, and SHA-512 algorithms.
A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a fixed-size bit string. The hash is designed to be a one-way function – it's infeasible to invert or reverse the computation.
Hashes are commonly used for password storage, file integrity verification, digital signatures, and data deduplication.
128-bit hash. Fast but not recommended for security (legacy use only).
160-bit hash. Deprecated for security but still used for compatibility.
256-bit hash. Recommended for security applications. Part of SHA-2 family.
512-bit hash. Highest security, slower but more secure than SHA-256.
MD5 and SHA-1 are not recommended for security-critical applications. Use SHA-256 or SHA-512 for password hashing, digital signatures, and cryptographic applications.