Hash Generator
Generate SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text.
Examples
| Input | Result |
|---|---|
| hello | MD5: 5d41402abc4b2a76b9719d911017c592 |
| hello | SHA-1: aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d |
| hello | SHA-256: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824 |
| password123 | SHA-256: ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f |
About this tool
Cryptographic hash functions take an input of any size and produce a fixed-length output (the hash or digest). The same input always gives the same hash, but even a tiny change in the input produces a completely different output. This tool supports MD5 (128-bit), SHA-1 (160-bit), SHA-256 (256-bit), and SHA-512 (512-bit), all computed in your browser using the Web Crypto API.
Hash functions are used for data integrity checks, file verification, digital signatures, and many other applications. When you download a file and compare its SHA-256 hash against the published value, you are confirming the file was not corrupted or tampered with. Note that MD5 and SHA-1 have known weaknesses and should not be used for security-sensitive applications. For new projects, SHA-256 is the standard choice. This tool processes everything locally, so your data never leaves the browser.
Frequently asked questions
What is the difference between hashing and encryption?
Hashing is a one-way function. You cannot recover the original input from a hash. Encryption is two-way: you can decrypt the ciphertext back to plaintext with the correct key. They serve different purposes.
Is MD5 still safe to use?
MD5 is considered cryptographically broken for security purposes. Collision attacks are practical and well-documented. Use SHA-256 or SHA-512 for anything security-related. MD5 is still fine for checksums where security is not a concern.
Can I use Web Crypto API hashes for password storage?
No. SHA-256 and other fast hash functions are not suitable for password storage because they can be brute-forced quickly. Use a purpose-built password hashing algorithm like bcrypt, scrypt, or Argon2 instead.
