Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text.
—
—
—
Click any hash to copy it. All hashing uses the Web Crypto API (SubtleCrypto).
How to Generate a Hash
- Enter your text — type or paste any text into the input box.
- Click "Generate All Hashes" — SHA-256, SHA-512, and SHA-1 hashes appear instantly.
- Copy a hash — click any hash value to copy it to your clipboard.
- Verify integrity — run the same text again later; the hashes should be identical if the text hasn't changed.
Frequently Asked Questions
Which hash algorithm should I use? ▼
For security-sensitive uses, choose SHA-256 or SHA-512. SHA-1 is deprecated for cryptographic use due to known collision attacks. MD5 is completely broken for security but still used for non-cryptographic checksums like verifying file downloads.
What is a cryptographic hash? ▼
A hash function converts any input into a fixed-length string of characters. Key properties: the same input always produces the same hash, a tiny change in input produces a completely different hash (avalanche effect), and it is practically impossible to reverse the hash to get the original input.
What is the difference between MD5, SHA-1, and SHA-256? ▼
MD5 produces 128-bit (32 hex character) hashes — broken for security, used only for checksums. SHA-1 produces 160-bit (40 hex chars) hashes — deprecated. SHA-256 produces 256-bit (64 hex chars) hashes — currently secure. SHA-512 produces 512-bit (128 hex chars) — strongest available here.
Can I use SHA-256 to store passwords? ▼
For storing user passwords, always use a purpose-built algorithm like bcrypt, scrypt, or Argon2 with a unique salt — never raw SHA-256. Raw SHA hashing of passwords is vulnerable to dictionary and rainbow table attacks.
What is a checksum? ▼
A checksum is a hash value used to detect errors or verify that data has not been modified. For example, software downloads often include an MD5 or SHA-256 checksum so you can verify the download wasn't corrupted or tampered with.