Generate secure hash values for text and files using MD5, SHA-1, SHA-256, and other algorithms.
128-bit hash, fast but cryptographically broken. Not recommended for security.
160-bit hash, faster than SHA-256 but considered weak for cryptographic use.
256-bit hash, widely used and considered secure for most applications.
512-bit hash, even more secure than SHA-256 with larger output.
Newer hash function, different design from SHA-2 family.
160-bit hash, alternative to SHA-1 with similar security properties.