Generate MD5, SHA-1, SHA-256, and SHA-512 hashes
Hash functions convert input data into a fixed-size string of bytes. The output is deterministic (same input always produces same output) and irreversible.
Common uses: Password storage, data integrity verification, digital signatures, checksums
Security note: MD5 and SHA-1 are deprecated for security. Use SHA-256 or SHA-512 for cryptographic applications.