Input

About Hash Functions

Hash functions generate a fixed-size output (hash) from variable-size input data. MD5 and SHA-1 are older algorithms, while SHA-256 and SHA-512 are more secure modern alternatives.

Note: MD5 and SHA-1 are considered cryptographically broken and should not be used for security purposes. Use SHA-256 or SHA-512 for secure hashing.