Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text instantly. Free, client-side, no data sent to any server.
What is a hash?
A cryptographic hash function takes an input of any size and produces a fixed-length string of characters (the "digest"). The same input always produces the same hash, but even a tiny change in the input produces a completely different output.
Supported algorithms
- MD5 (128-bit): fast but cryptographically broken. Still used for checksums and non-security applications.
- SHA-1 (160-bit): deprecated for security use. Collision attacks are practical.
- SHA-256 (256-bit): part of the SHA-2 family. Widely used in TLS certificates, Bitcoin, and data integrity checks.
- SHA-384 (384-bit): truncated version of SHA-512. Used in some TLS cipher suites.
- SHA-512 (512-bit): strongest SHA-2 variant. Preferred when maximum security margin is needed.
Common uses
- Verifying file integrity (comparing checksums after download)
- Password storage (hashed, never stored in plain text)
- Digital signatures and certificates
- Blockchain and cryptocurrency
- Data deduplication
Frequently Asked Questions
Is my text sent to a server? No. All hashing runs entirely in your browser using the Web Crypto API (SHA) or a JavaScript implementation (MD5). Nothing is uploaded.
Can I reverse a hash to get the original text? No. Cryptographic hash functions are one-way. You cannot derive the input from the hash. Attackers use precomputed tables (rainbow tables) or brute force, which is why strong, salted hashing is important for passwords.
Which algorithm should I use? For general-purpose integrity checks, SHA-256 is the standard choice. Avoid MD5 and SHA-1 for anything security-related.