About these algorithms
| Algorithm | Use Case | Notes |
|---|---|---|
| SHA-256 | General purpose hashing, checksums | Fast, widely supported. With a salt, produces HMAC-SHA-256. Not ideal for password storage (use bcrypt instead). |
| SHA-512 | Higher-security checksums, message authentication | With a salt, produces HMAC-SHA-512. Not the same as sha512crypt — use the sha512crypt option for /etc/shadow. |
| sha512crypt | Linux /etc/shadow |
The $6$ crypt format — 5000 rounds of SHA-512 with salt. Equivalent to openssl passwd -6 or mkpasswd -m sha-512. Computed entirely in your browser. |
| bcrypt | Password storage in applications | Intentionally slow, with built-in salt. For new projects, also consider Argon2. |
| MD5 | Legacy systems, checksums | Do not use for security. Included for compatibility with older systems. |
Want to learn more? Read our guide to how password hashing works -- covering the history and tradeoffs of each algorithm.