Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 hashes
Security Note
MD5 and SHA-1 are considered cryptographically broken. Use SHA-256 or higher for security-sensitive applications.