📚Dev Reference

Hash Algorithms Comparison

When to use MD5, SHA-256, and others.

Explanation

Hashes are one-way functions used for integrity checks and security.

Examples

Integrity
Output
SHA-256
Legacy
Output
MD5

Code Examples

List
MD5    - Fast, insecure (Check files)
SHA-1  - Deprecated, insecure
SHA-256- Strong, standard security
SHA-512- Stronger, for 64-bit systems

Try it Now

💡 Tips

  • SHA-256 is the "gold standard" for most web applications
  • Use MD5 only for non-security tasks like checking file integrity
  • Never use these raw hashes for passwords (use bcrypt/argon2)

⚠️ Common Pitfalls

  • MD5 and SHA-1 are vulnerable to collision attacks