Hash functions are one-way mathematical functions that convert input data of any size into a fixed-size hash value. They are fundamental to digital signatures, password storage, data integrity verification, and blockchain technology.
Compare how different algorithms hash the same input:
Verify if input data matches an expected hash value:
| Algorithm | Output Size | Security Status | Common Uses |
|---|---|---|---|
| MD5 | 128 bits (32 hex chars) | 🔴 Broken - Do not use | Legacy systems, checksums (non-security) |
| SHA-1 | 160 bits (40 hex chars) | 🟡 Deprecated - Avoid | Legacy systems, Git (being phased out) |
| SHA-256 | 256 bits (64 hex chars) | 🟢 Secure | Bitcoin, SSL/TLS, digital signatures |
| SHA-512 | 512 bits (128 hex chars) | 🟢 Secure | High-security applications |
| SHA3-256 | 256 bits (64 hex chars) | 🟢 Secure | Modern applications, NIST standard |
| SHA3-512 | 512 bits (128 hex chars) | 🟢 Secure | High-security modern applications |
| BLAKE2b-512 | 512 bits (128 hex chars) | 🟢 Secure | High-performance applications |