Hashing algorithms take any string and turn it into a fixed-length “fingerprint” that is unable to be reversed. This means that if your data in your database is compromised, the hacker cannot get the user’s passwords if they were hashed well. Only secure, or cryptographic, hash functions can be used for password hashing (SHA256, SHA512, RipeMD, WHIRLPOOL, etc.)Sadly, just cryptographically hashing passwords does not ensure safety. The easiest way to decrypt a hash is just to guess the password.