A hash generator applies a cryptographic hash function to produce a fixed-length digest from any input text. Hash values are deterministic (same input always produces same output) and one-way (you cannot reverse a hash to get the original text). Use hashes for data integrity verification, checksums, and message authentication with HMAC.

Security note: MD5 and SHA-1 are cryptographically broken and should not be used for security-sensitive applications. For password hashing, use bcrypt, scrypt, or Argon2 — not raw hash functions.