Hash algorithms are fundament to many cryptographic applications. Although widely associated with digital signature technology, the hash algorithm has a range of other uses. SHA-1 and MD5 are amongst the most widely known, trusted and used. When utilised with a password (the HMAC version), the potential uses of these algorithms extends further.
This website is intended to serve as a start point for your hash algorithmic needs. It presents information of the algorithms themselves. Also you can find some info about the electronic signature here.
Whether you are entirely new to the topic, or whether you are a seasoned cryptographic practitioner, you should hopefully find something of value.