Generate MD5, SHA-1, SHA-256, SHA-512 hashes from text or files.
A cryptographic hash function takes an input (text, file, or any data) and produces a fixed-size string of characters, called a hash or digest. The same input always produces the same hash, but even a tiny change in input produces a completely different hash.
MD5 (128-bit) is fast but considered cryptographically broken — use it only for checksums, not security. SHA-1 (160-bit) is deprecated for security but still common for file verification. SHA-256 and SHA-512 (256/512-bit) are part of the SHA-2 family and widely used for security, digital signatures, and blockchain.
Hashes are one-way: you cannot reverse a hash to get the original input. This makes them useful for password storage, data integrity verification, and digital signatures.