Hash Generator
About Hash Functions
A cryptographic hash function takes input of any size and produces a fixed-length output (the hash or digest). The same input always produces the same hash, but even a tiny change in input produces a completely different hash.
MD5 (128-bit) and SHA-1 (160-bit) are considered insecure for cryptographic purposes but are still used for checksums and non-security hashing. SHA-256 and SHA-512 are secure and widely used in TLS, digital signatures, and blockchain.