Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text. All hashing runs in your browser — nothing is sent to any server.
Generate Cryptographic Hashes
MD5
128-bit
Enter text above to generate hash...
SHA-1
160-bit
Enter text above to generate hash...
SHA-256
256-bit
Enter text above to generate hash...
SHA-384
384-bit
Enter text above to generate hash...
SHA-512
512-bit
Enter text above to generate hash...
Hash Verification
Paste an expected hash below to verify it matches the generated hash above.
Hash Algorithm Comparison
- MD5 (128-bit): Fast, widely used for file integrity checks. NOT secure for passwords or cryptography — known collision vulnerabilities
- SHA-1 (160-bit): Deprecated for security use (collisions found in 2017). Still used in some legacy systems and Git
- SHA-256 (256-bit): Part of SHA-2 family. Industry standard for security — used in TLS, Bitcoin, code signing
- SHA-384 (384-bit): SHA-2 variant, stronger than SHA-256. Used in some high-security contexts
- SHA-512 (512-bit): Strongest SHA-2 variant. Slightly faster than SHA-256 on 64-bit processors
Common Uses for Hash Functions
- File integrity: Verify downloaded files haven't been corrupted or tampered with
- Password storage: Store hashed passwords (use bcrypt/argon2 — not SHA for passwords)
- Digital signatures: Hash the message, then sign the hash
- Checksums: Detect accidental data corruption in file transfers
- Data deduplication: Find identical files by comparing hashes