HASH TOOLS
Generate and verify cryptographic hashes using various algorithms. Hash functions are one-way functions that convert any data into a fixed-size string.
ABOUT CRYPTOGRAPHIC HASHES
A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size. It is designed to be a one-way function, that is, a function which is practically infeasible to invert.
COMMON HASH ALGORITHMS
ALGORITHM | OUTPUT LENGTH | SECURITY |
---|---|---|
MD5 | 128 bits (32 hex chars) | Broken (not secure) |
SHA-1 | 160 bits (40 hex chars) | Deprecated |
SHA-256 | 256 bits (64 hex chars) | Strong |
SHA-512 | 512 bits (128 hex chars) | Very Strong |
Bcrypt | Variable | Password-specific |
HASH PROPERTIES
- Deterministic: Same input always produces the same output
- One-way: Cannot feasibly be reversed to obtain the original input
- Avalanche effect: Small changes in input create large changes in output
- Collision-resistant: Hard to find two different inputs with the same output
USAGE RECOMMENDATIONS
- For general data integrity: SHA-256
- For password storage: Bcrypt, Argon2, or PBKDF2
- Avoid MD5 and SHA-1 for security-critical applications