What is a Hash Algorithm?
A hash algorithm is an algorithm that converts data of arbitrary length into a value of fixed length. It is mainly used for data integrity verification, password storage, etc.
Detailed explanation of supported algorithms:
MD5 (Message Digest Algorithm 5)
- Hash Length: 128-bit (32 characters)
- Feature: Fast processing speed
- Weakness: Vulnerable to collision attacks, not suitable for security
- Usage Example: File integrity check, non-cryptographic purposes
SHA-1 (Secure Hash Algorithm 1)
- Hash Length: 160-bit (40 characters)
- Feature: Safer than MD5 but still vulnerable
- Weakness: Google demonstrated collision attack in 2017
- Usage Example: Legacy system compatibility
SHA-256
- Hash Length: 256-bit (64 characters)
- Feature: SHA-2 family, most widely used currently
- Security Level: Considered safe until 2030
- Usage Example: Bitcoin, SSL certificates
SHA-512
- Hash Length: 512-bit (128 characters)
- Feature: Longer hash value than SHA-256
- Security Level: Used when high security is required
- Usage Example: Financial systems with high security requirements
Base64
- Feature: Encoding method, not a hash
- Reversibility: Decodable
- Usage Example: Image embedding, API key transmission