Hash Generator
Input
A hash function converts any input into a fixed-length string. The same input always produces the same hash, but even a single character change produces a completely different result. MD5 and SHA-1 are no longer recommended for security-sensitive use cases.
1.
Type or paste the text you want to hash
2.
All five hashes (MD5, SHA-1, SHA-256, SHA-384, SHA-512) are generated instantly
3.
Copy the hash you need
▸
Verifying file integrity by comparing checksums
▸
Generating SHA-256 hashes for use in security protocols or signing
▸
Checking whether two pieces of text are identical without comparing them directly
Which hash algorithm should I use?
For security-sensitive uses, choose SHA-256 or higher. MD5 and SHA-1 are cryptographically broken and should only be used for checksums or non-security purposes like file integrity verification.
Can I hash a file?
This tool hashes text input. For file hashing, use your operating system's built-in tools (sha256sum on Linux/macOS, Get-FileHash on Windows).
Are hashes reversible?
Hashing is a one-way function. You cannot retrieve the original text from its hash, which is what makes hashes useful for storing passwords.
Is my text sent to a server?
All hashing runs locally in your browser. SHA-1, SHA-256, SHA-384, and SHA-512 use the Web Crypto API; MD5 uses the spark-md5 library. No data is transmitted anywhere.
Why do two similar strings produce completely different hashes?
Hash functions are designed with the avalanche effect - even a single character change produces a completely different output, making tampering detectable.