Skip to main content

Hash Generator

Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or files.

What is a Hash?

A cryptographic hash function takes input data and produces a fixed-size string of characters (the hash). The same input always produces the same hash, but even tiny changes to the input create completely different hashes.

Supported Algorithms

  • MD5: 128-bit hash, fast but not collision-resistant. Use for checksums, not security.
  • SHA-1: 160-bit hash, deprecated for security use but still common for checksums.
  • SHA-256: 256-bit hash, widely used for security. Part of the SHA-2 family.
  • SHA-384: 384-bit hash, truncated version of SHA-512.
  • SHA-512: 512-bit hash, strongest in the SHA-2 family.

Use Cases

  • File Integrity: Verify downloads haven't been corrupted or modified
  • Password Storage: Store hashed passwords instead of plaintext
  • API Authentication: HMAC signatures for API requests
  • Data Deduplication: Identify duplicate files by hash
  • Blockchain: Bitcoin and other cryptocurrencies use SHA-256
  • Digital Signatures: Hash documents before signing

Security Notes

  • MD5 and SHA-1 are considered cryptographically broken for security purposes
  • Use SHA-256 or SHA-512 for security-sensitive applications
  • For password hashing, use specialized algorithms like bcrypt or Argon2
  • Hashes are one-way - you cannot reverse a hash to get the original input

Privacy

All hashing is performed locally in your browser using the Web Crypto API. Your text and files are never uploaded to any server.