004.1

HASH

001
INPUT TEXT
ttt
Live preview enabled
002
ABOUT CRYPTOGRAPHIC HASHING

Cryptographic hash functions convert input data into a fixed-size string of bytes. The output (hash) is unique to each unique input and cannot be reversed.

Security: MD5 and SHA-1 are deprecated due to collision vulnerabilities. Use SHA-256 or SHA-512 for security-critical applications.

Use cases: Data integrity verification, password hashing (with salt), digital signatures, blockchain.