Generate MD5, SHA-1, SHA-256, and SHA-512 hashes
Hash functions convert input data of arbitrary size into a fixed-size string of characters. They are commonly used for data integrity verification, password storage, and digital signatures.
Available Algorithms:
Note: MD5 and SHA-1 are considered cryptographically broken and should not be used for security purposes. Use SHA-256 or SHA-512 for secure applications.