Generate cryptographic hashes using multiple algorithms simultaneously
Security Notice
MD5 and SHA-1 are considered cryptographically broken and should not be used for security purposes. For security-sensitive applications, use SHA-256 or stronger algorithms.