7 min read
2026-03-11
A hash function is a mathematical algorithm that converts data of any size into a fixed-length string. Key properties: the same input always produces the same hash, but changing even a single character completely changes the result.
Length: 32 characters (128 bits)
Speed: very fast
Security: **outdated**, not recommended for passwords
Use case: file integrity verification
Length: 40 characters (160 bits)
Security: **vulnerable**, do not use for sensitive data
Use case: Git uses SHA-1 for commits
Length: 64 characters (256 bits)
Security: **reliable** standard
Use case: SSL certificates, Bitcoin, digital signatures
Length: 128 characters (512 bits)
Security: **maximum** among standard algorithms
Use case: critical data, fintech
| Task | Algorithm |
|---|---|
| Verifying a downloaded file | MD5 or SHA-256 |
| Storing passwords in a database | bcrypt, SHA-256 |
| Digital signature | SHA-256, SHA-512 |
| Quick duplicate checking | MD5 |
When downloading from official websites, the file hash is often provided. Calculate the hash of the downloaded file and compare — if it matches, the file has not been tampered with.
A hash cannot be "decrypted" — it is a one-way function. For encryption, use AES or RSA.
Compute the hash of any text in the Hash Generator.
See also: Base64 Encoder, Password Generator, Checksum Calculator