Generate cryptographic hashes using various algorithms
128-bit hash, fast but not cryptographically secure
160-bit hash, legacy algorithm, avoid for security
256-bit hash, good balance of security and speed
384-bit hash, stronger variant of SHA-2
512-bit hash, strongest SHA-2 variant
160-bit hash, alternative to SHA-1