Generate SHA-1 (Secure Hash Algorithm 1) hash values from text input. SHA-1 produces a 160-bit hash value. While SHA-1 is deprecated for security purposes, it is still used for checksums and legacy systems.
SHA-1 is commonly used for checksums, data integrity verification, and in legacy systems. However, SHA-256 is recommended for new applications.
SHA-1 is considered cryptographically broken and should not be used for security-sensitive applications. Use SHA-256 or SHA-512 instead.
A SHA-1 hash is 40 hexadecimal characters long (160 bits = 20 bytes = 40 hex characters).