Type The Password You Want To Hash Below

Password hash is a representation of a plain text password that has been run through an algorithm to produce a unique, encrypted output. This output is stored in the database instead of the plain text password and is used when a user authenticates with the website. The hash value is generated by taking the plain text password and running it through an algorithm such as SHA-2, MD5 or bcrypt.


What is SHA-2?

SHA-2 is a family of cryptographic hash algorithms developed by the National Security Agency (NSA). These algorithms are used to generate digital signatures, secure data transmission, and protect sensitive information. SHA-2 includes several hashing algorithms including SHA-256, SHA-384, and SHA-512, which are used to generate a unique message digest (hash) of a given data set.

What is MD5?

MD5 (Message-Digest algorithm 5) is a cryptographic hash function that produces a 128-bit (16-byte) hash value. It is mostly used to verify data integrity and check the authenticity of files. MD5 is commonly used to generate unique signatures for files, which can be used to compare if two or more files have the same contents.

What is Bcrypt?

Bcrypt is an adaptive password hashing algorithm. It is designed to be slow and require a large amount of resources to compute, making it difficult to crack passwords through brute-force attacks. Bcrypt uses a salt, which is a random string of data, to protect the stored password hash from pre-computed rainbow tables and other cracking techniques.