Generate cryptographic hashes from text or files
MD5: Fast but cryptographically broken. Use only for checksums, not security.
SHA-1: Also deprecated for security. Suitable for legacy compatibility only.
SHA-256: Secure and widely used. Part of the SHA-2 family. Recommended for most uses.
SHA-512: More secure than SHA-256 with longer output. Best for high-security applications.