Hash Algorithm Reference
Complete reference for cryptographic hash algorithms.
Algorithm Comparison
| Algorithm | Bits | Hex Length | Security | Use Case |
|---|---|---|---|---|
| MD5 | 128 | 32 | Broken | Checksums only |
| SHA-1 | 160 | 40 | Weak | Legacy systems |
| SHA-256 | 256 | 64 | Strong | General security |
| SHA-512 | 512 | 128 | Very Strong | High security |
Security Recommendations
For security-sensitive applications, always use SHA-256 or SHA-512. MD5 and SHA-1 are considered cryptographically broken and should only be used for non-security purposes like checksums or content identification.