Hash Algorithm Reference

Complete reference for cryptographic hash algorithms.

Algorithm Comparison

AlgorithmBitsHex LengthSecurityUse Case
MD512832BrokenChecksums only
SHA-116040WeakLegacy systems
SHA-25625664StrongGeneral security
SHA-512512128Very StrongHigh security

Security Recommendations

For security-sensitive applications, always use SHA-256 or SHA-512. MD5 and SHA-1 are considered cryptographically broken and should only be used for non-security purposes like checksums or content identification.