Generate MD5, SHA-1, SHA-256, and other cryptographic hashes from text or files. Instant hash calculation.
128-bit hash function. Fast but no longer considered secure for cryptographic purposes. Still useful for checksums and data integrity verification.
160-bit hash function. More secure than MD5 but deprecated for cryptographic use. Still used in legacy systems and Git version control.
256-bit hash function. Part of SHA-2 family. Currently secure and widely used for cryptographic applications, including Bitcoin and SSL certificates.
512-bit hash function. Also part of SHA-2 family. Provides higher security than SHA-256 at the cost of longer hash values.