Create SHA-1, SHA-256, SHA-384, and SHA-512 hash values from text or files. Essential for security and data integrity verification.
MD5 and SHA-1 are cryptographically broken and should not be used for security-critical functions like password hashing. Use SHA-256 or higher for security. MD5 is still useful for simple checksums and legacy compatibility.