Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or files.
What is a Hash?
A cryptographic hash function takes input data and produces a fixed-size string of characters (the hash). The same input always produces the same hash, but even tiny changes to the input create completely different hashes.
Supported Algorithms
- MD5: 128-bit hash, fast but not collision-resistant. Use for checksums, not security.
- SHA-1: 160-bit hash, deprecated for security use but still common for checksums.
- SHA-256: 256-bit hash, widely used for security. Part of the SHA-2 family.
- SHA-384: 384-bit hash, truncated version of SHA-512.
- SHA-512: 512-bit hash, strongest in the SHA-2 family.
Use Cases
- File Integrity: Verify downloads haven't been corrupted or modified
- Password Storage: Store hashed passwords instead of plaintext
- API Authentication: HMAC signatures for API requests
- Data Deduplication: Identify duplicate files by hash
- Blockchain: Bitcoin and other cryptocurrencies use SHA-256
- Digital Signatures: Hash documents before signing
Security Notes
- MD5 and SHA-1 are considered cryptographically broken for security purposes
- Use SHA-256 or SHA-512 for security-sensitive applications
- For password hashing, use specialized algorithms like bcrypt or Argon2
- Hashes are one-way - you cannot reverse a hash to get the original input
Privacy
All hashing is performed locally in your browser using the Web Crypto API. Your text and files are never uploaded to any server.