Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text
Enter the text you want to hash
Hash functions are mathematical algorithms that convert input data of any size into a fixed-size string of characters. They're widely used in cryptography, data integrity verification, and password storage.
While SHA-1 is included for compatibility, it's considered cryptographically weak. Use SHA-256 or SHA-512 for security-critical applications.