A cryptographic hash function takes any input (a password, a file, a block of transactions) and produces a fixed-length string of characters called a digest or hash. The same input always produces the same hash, but even a tiny change in input produces a completely different output. Crucially, it is computationally infeasible to reverse the process -- you cannot recover the original input from its hash.
Hash functions process input data through a series of mathematical operations that mix, shift, and compress the bits. Common algorithms include MD5 (128-bit output, now considered insecure), SHA-1 (160-bit, deprecated for security use), SHA-256 (256-bit, used by Bitcoin), and SHA-3 (variable length, newest standard). The output length is always the same regardless of input size -- hashing a single character and hashing an entire movie both produce the same-length digest.
Key properties of a good cryptographic hash: deterministic (same input = same output), fast to compute, infeasible to reverse (pre-image resistance), infeasible to find two inputs with the same hash (collision resistance), and a small change in input changes the output completely (avalanche effect).
Hash functions are everywhere in computing. Passwords are stored as hashes (with salting) so databases never contain plaintext credentials. Git identifies every commit, tree, and blob by its SHA-1 hash. Bitcoin miners race to find a nonce that produces a SHA-256 hash below a target value. File downloads include checksums so you can verify integrity. Digital signatures hash the message before encrypting. Understanding hashing is foundational for security, blockchain, and data integrity.
TerminalFeed offers a Hash Generator tool that computes MD5, SHA-1, SHA-256, and SHA-512 hashes instantly in the browser. The BTC Network panel on the dashboard shows block hashes and hashrate data from the Bitcoin network.