HASH algorithms refer to cryptographic algorithms that represent a data set (message, file, text, etc.) as a fixed-length string. These algorithms summarize the input data (also referred to as the hash value or digest value) into a string of a certain length. This summary can be used for purposes such as validating data integrity, creating digital signatures, password storage. There are different types of HASH algorithms, including Bcrypt, Scrypt, SHA, MD5.