ONLINE HASH GENERATOR SHA-1
Source string specification form
Specify the source string in this form, then click on the button GENERATE
Result Form
This form will show the result of generating the source string in SHA-1
WHAT IS A HASHING ALGORITHM A SHA-1
The SHA-1 (Secure Hash Algorithm 1) hash is one of the cryptographic hashing algorithms that is used to create a unique "fingerprint" of a message. The SHA-1 hash takes a message of arbitrary length as input and returns a fixed hash code of 160 bits (20 bytes) in length.
The SHA-1 hash was developed by the US National Security Agency (NSA) and was published in 1995. Currently, the SHA-1 hash is considered obsolete and unsafe for cryptographic use, as there are methods of attacking this algorithm that allow you to get collisions (that is, different messages that give the same hash code) in a reasonable time.
It is currently recommended to use more secure hashing algorithms such as SHA-2 (SHA-256, SHA-384, SHA-512) and SHA-3.