Generate MD5, SHA1 and SHA256 hashes from any text input.
A hash function converts data of any size into a fixed-length string of characters. The same input always produces the same hash, but even a tiny change in input produces a completely different output.
Hashes are used for password storage, file integrity verification, digital signatures and data deduplication. Common algorithms include MD5 (fast but insecure), SHA-1 (deprecated for security) and SHA-256 (recommended for most use cases).
Hello world
Example SHA256 hash:
a948904f2f0f479b8f8197694b30184b0d2e42...