Generate secure hashes using MD5, SHA-1, SHA-256, and SHA-512 algorithms for data integrity verification
Fast but cryptographically broken. Use only for non-security purposes like checksums.
Deprecated for security use. Still used in some legacy systems.
Secure and widely used. Recommended for most applications requiring cryptographic security.
Highest security level. Ideal for applications requiring maximum hash strength.