Generate secure hashes and convert numbers between different base systems
128-bit hash. Fast but cryptographically broken. Use only for checksums, never for security.
⚠️ Vulnerable to collision attacks - deprecated for security use
160-bit hash. Being phased out due to vulnerabilities. Legacy systems only.
⚠️ Deprecated by major browsers and security standards
256-bit hash. Currently secure and recommended for most applications.
✅ Recommended for password hashing, digital signatures, certificates
512-bit hash. Higher security margin, better for high-security applications.
✅ Recommended for enterprise and government applications
Uses only 0 and 1. Foundation of all computer systems and digital logic.
Example: 1010₂ = 10₁₀
Uses digits 0-7. Common in Unix file permissions and legacy systems.
Example: 755₈ = 493₁₀ (rwxr-xr-x permissions)
Standard human number system using digits 0-9.
Default representation in most programming languages
Uses 0-9 and A-F. Essential for colors, memory addresses, and byte representation.
Example: #FF0000 = red color, 0x1A3F = 6719₁₀
📊 Status: Ready
📏 Input Length: 0 characters
🔢 Input Bytes: 0 bytes
⚡ Generation Time: 0ms
📊 Status: Ready
🔢 Decimal Value: 0
📏 Integer Part: 0
📐 Fractional Part: 0
⚡ Precision: Integer