Input String to Hash
MD5
SHA1
SHA224
SHA256
SHA384
SHA512
RIPEMD160
MD5
- A cryptographic hash function that produces a 128-bit hash value, typically represented as a 32-character hexadecimal number.
- Despite being broken and considered insecure, MD5 is still widely used for file integrity checks and non-secure applications due to its speed.
SHA-1
- A cryptographic hash function that generates a 160-bit hash value, commonly displayed as a 40-character hexadecimal string.
- Once widely used in security protocols like SSL/TLS, SHA-1 is now deprecated in favor of stronger algorithms due to its vulnerability to collision attacks.
SHA-224
- A variant of SHA-256 that produces a 224-bit hash value, designed for environments with a need for slightly smaller output.
- SHA-224 is typically used in applications where security is important, but storage space is limited, like embedded systems.
SHA-256
- A member of the SHA-2 family, this algorithm generates a 256-bit hash value, offering enhanced security over SHA-1.
- SHA-256 is the hash function behind the security of cryptocurrencies like Bitcoin.
SHA-384
- Another member of the SHA-2 family that produces a 384-bit hash value, providing higher security and a longer output than SHA-256.
- It is often used in digital certificates and high-security communications when a stronger hash is required.
SHA-512
- Produces a 512-bit hash value, providing robust security, part of the SHA-2 family.
- Often used in cryptographic applications where both security and large hash sizes are required, such as secure file storage.
RIPEMD-160
- A cryptographic hash function that produces a 160-bit hash value, developed as an alternative to the SHA family.
- RIPEMD-160 is less commonly used in mainstream applications but is popular in some European cryptographic standards.