Generate cryptographic hashes using MD5, SHA-1, SHA-256, and SHA-512 algorithms. Support for text input and file hashing with multiple output formats.
MD5: 128-bit hash function, fast but not cryptographically secure. Good for checksums and non-security purposes.
SHA-1: 160-bit hash function, faster than SHA-256 but considered weak for cryptographic purposes.
SHA-256: 256-bit hash function, part of SHA-2 family. Secure and widely used for cryptographic applications.
SHA-512: 512-bit hash function, more secure than SHA-256 but slower. Good for high-security applications.