Most Popular Hashing Algorithms (With Use Cases)

Hashing is a fundamental technique in modern cryptography, cybersecurity, data storage, and web development. In this article, we’ll explore the most widely used hashing algorithms, what they’re good for, and their current status in terms of security.

Cryptographic Hash Functions

These algorithms are designed to securely encode data in a way that is irreversible and collision-resistant. They are commonly used in digital signatures, blockchain, JWTs, and more.

NameOutput SizeSecurityCommon UsesNotes
MD5128-bit❌ BrokenChecksums, CachingFast but vulnerable to collisions
SHA-1160-bit❌ WeakLegacy systems, SSLBroken in 2017 (collision found)
SHA-256256-bit✅ SecureWeb Crypto, Blockchain, JWTGood balance of speed & security
SHA-384384-bit✅ SecureDigital signatures, TLSMore secure, longer output
SHA-512512-bit✅ SecureHigh-security encryptionSlower, very strong
SHA-3256 / 384 / 512-bit✅ Very SecurePost-quantum, Modern cryptoKeccak-based, newer standard

Password Hashing Algorithms

These are specialized algorithms designed to securely hash passwords. They are intentionally slow to defend against brute-force attacks.

NameTypeSecurityUsesNotes
bcryptKDF✅ StrongPassword storageSalted and adaptive workload
scryptKDF + Memory✅ StrongPassword storageMemory-hard, resistant to GPU cracking
PBKDF2KDF✅ ModerateBrowser auth, fallbackAvailable in Web Crypto API
Argon2KDF✅✅✅ ModernSecure password hashingWinner of Password Hashing Competition

Checksum & Fast Non-Cryptographic Hashes

These are not secure for cryptographic use but are fast and useful for data integrity or indexing.

NameTypeUse Case
CRC32ChecksumZIP files, network packets
Adler-32ChecksumFile integrity verification
MurmurHashFast HashHash tables, databases
xxHashVery Fast HashFile deduplication, backups

Online Hashing Tools and Services

Need to hash something online quickly? Check out our collection of trusted online hashing tools: