|

0 characters

About Hash Algorithms

Cryptographic Hashes

  • MD5 - 128-bit, not recommended for security
  • SHA-1 - 160-bit, deprecated for security
  • SHA-256 - 256-bit, widely used, secure
  • SHA-384/512 - Higher security options

Common Uses

  • • Verify file integrity
  • • Password storage (with salt)
  • • Digital signatures
  • • Checksums for downloads