Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes instantly
All hashing runs in your browser β nothing is sent to a server.
What Is a Cryptographic Hash?
A hash function takes an input of any length and produces a fixed-size output β the hash or digest. Like a fingerprint for data: identical inputs always produce identical outputs, but even a single changed character produces a completely different hash. This is called the avalanche effect.
This tool computes four common hash algorithms simultaneously:
- MD5 β 128-bit / 32 hex characters. Fast, widely used for checksums, but cryptographically broken β collisions are computationally feasible.
- SHA-1 β 160-bit / 40 hex characters. Deprecated for security use (collision found in 2017), still used in Git and some legacy systems.
- SHA-256 β 256-bit / 64 hex characters. Part of the SHA-2 family. The current standard for document signing, HTTPS certificates, and Bitcoin.
- SHA-512 β 512-bit / 128 hex characters. More collision resistance than SHA-256; used when maximum security margin is required.
Common Use Cases
File Integrity Verification
Software distributors publish SHA-256 checksums alongside downloads. After downloading, compute the hash and compare it to the published value. If they match, the file is authentic and unmodified. If they differ, the file may be corrupted or tampered with.
Data Deduplication
Hash the content of files or database records and compare hashes to detect duplicates β far faster than comparing bytes directly. Git uses SHA-1/SHA-256 this way to identify every file and commit in a repository.
API Request Signing (HMAC)
HMAC (Hash-based Message Authentication Code) uses a secret key combined with SHA-256 to sign API requests, proving they came from an authenticated source and were not tampered with in transit. AWS, Stripe, and most modern APIs use HMAC-SHA256.
What Hash Algorithms Should I Use?
- Checksums / integrity checks: SHA-256 (or MD5 if compatibility with legacy systems is required)
- Digital signatures / certificates: SHA-256 minimum (SHA-384 or SHA-512 for high-value use cases)
- Password storage: Do NOT use any of these directly. Use bcrypt, Argon2id, or PBKDF2 with a high iteration count.
- Git / version control: SHA-1 (legacy) or SHA-256 (new Git repositories)
- API signing (HMAC): HMAC-SHA256
Privacy: All Hashing Is Done in Your Browser
This tool uses the browser's built-in Web Crypto API for SHA-1, SHA-256, and SHA-512, and a pure JavaScript implementation for MD5. No data leaves your device. The tool works offline.