#️⃣ Hash Generator
Compute MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or files instantly. All processing happens locally — your data never leaves your browser.
FAQ
What is a cryptographic hash?
A cryptographic hash function converts any input (text, file, etc.) into a fixed-size string called a digest. The same input always produces the same hash. Even a single character change produces a completely different hash. Hashes are one-way — you cannot recover the original data from the hash alone.
Which algorithm should I use?
For security-sensitive use cases (checksums, signing, certificates), use SHA-256 or SHA-512. SHA-1 is deprecated for security use. MD5 is broken for security but still used for non-adversarial checksums. For password hashing, use a dedicated algorithm like bcrypt or Argon2 — not a raw hash.
Is MD5 safe to use?
MD5 is cryptographically broken — collisions (two different inputs with the same hash) can be deliberately crafted. Do not use MD5 for passwords, digital signatures, or certificate fingerprints. It is still useful for simple, non-security file integrity checks.
Is my data sent to a server?
No. SHA-family hashes use the browser's built-in Web Crypto API (crypto.subtle.digest()). MD5 is computed with a pure JavaScript implementation. Nothing leaves your device.
What is SHA-256 used for?
SHA-256 is used for file integrity verification (checksums), digital signatures (code signing, TLS certificates), Bitcoin proof-of-work, and HMAC tokens. It produces a 256-bit (64 hex character) output.