004.1
HASH
001
INPUT TEXT
ttt
Live preview enabled
002
ABOUT CRYPTOGRAPHIC HASHING
Cryptographic hash functions convert input data into a fixed-size string of bytes. The output (hash) is unique to each unique input and cannot be reversed.
Security: MD5 and SHA-1 are deprecated due to collision vulnerabilities. Use SHA-256 or SHA-512 for security-critical applications.
Use cases: Data integrity verification, password hashing (with salt), digital signatures, blockchain.