Cryptographic hash functions produce a fixed-size digest from arbitrary input data. Used for data integrity verification, password storage, digital signatures, and checksums. Generates hashes using SHA-256 (recommended), SHA-512, SHA-1 (legacy), and MD5 (legacy, not for security).
Enter or paste text and the tool generates hash digests using MD5, SHA-1, SHA-256, and SHA-512. Each hash displays in hexadecimal format with one-click copy. Toggle between uppercase and lowercase output.
Hash generation verifies data integrity by comparing file checksums to detect corruption. Developers use hashes for cache keys, content-addressable storage, deterministic IDs, webhook signatures, HTTP ETags, and unique identifiers from input parameters.
Uses Web Crypto API (SubtleCrypto.digest) for SHA-1, SHA-256, and SHA-512. MD5 is implemented in JavaScript since Web Crypto doesn't support it. All hash functions are deterministic. The same input always produces the same output. Fixed-size outputs: MD5 (128 bits), SHA-1 (160 bits), SHA-256 (256 bits), SHA-512 (512 bits).
A cryptographic hash function takes an input (message) and returns a fixed-size string of bytes called a hash or digest. The same input always produces the same hash, but even a tiny change in the input produces a completely different hash. It is computationally infeasible to reverse a hash back to its input.
For security purposes, use SHA-256 or SHA-512. MD5 and SHA-1 are considered cryptographically broken and should only be used for non-security checksums. For password hashing, use specialized algorithms like bcrypt, scrypt, or Argon2 - not raw SHA.
MD5 is not safe for security-sensitive applications. Collision attacks have been demonstrated since 2004. However, MD5 is still acceptable for non-cryptographic checksums, such as verifying file integrity after downloads.
SHA-256 produces a 256-bit (32-byte) hash, while SHA-512 produces a 512-bit (64-byte) hash. SHA-512 offers a larger security margin but is slightly slower. Both are part of the SHA-2 family and are considered secure.
Generate HMAC authentication codes using SHA-256, SHA-384, and SHA-512.
Generate salted SHA-256 and SHA-512 hashes with configurable iteration count using the Web Crypto API.
Generate strong, secure passwords with customizable length and character rules.
Transform, format, generate, and encode data instantly. Private, fast, and always free.
Browse All Tools