Generate MD5, SHA-1, SHA-256, and SHA-512 hashes
A hash is a fixed-length "fingerprint" of any input. The same input always produces the same hash. MD5 and SHA-1 are weak — use SHA-256 or SHA-512 for security.