LahbTools
Advertisement

Hash Generator

Generate SHA-1, SHA-256, SHA-384 and SHA-512 cryptographic hashes from any text.

Advertisement

What is a cryptographic hash?

A hash function takes any input text and produces a fixed-length string of hexadecimal characters. The same input always produces the same hash. Even a tiny change in the input produces a completely different hash.

Hash algorithms supported

  • SHA-1 — 160-bit hash (40 hex characters). Deprecated for security use but still common for checksums.
  • SHA-256 — 256-bit hash (64 hex characters). The most widely used algorithm today, used in TLS, Bitcoin and code signing.
  • SHA-384 — 384-bit variant of SHA-2, used in TLS certificates and HMAC.
  • SHA-512 — 512-bit hash (128 hex characters). Maximum strength in the SHA-2 family.

Common uses for hashing

  • Verifying file integrity (compare checksums)
  • Storing passwords securely (with salt)
  • Generating digital signatures
  • Cache-busting in web development
  • Creating unique identifiers from content

Is hashing the same as encryption?

No. Encryption is reversible — you can decrypt data with the right key. Hashing is a one-way function; you cannot recover the original text from a hash. This makes hashing ideal for passwords and integrity checks.

Is my text secure?

All hashing uses the browser's built-in Web Crypto API (crypto.subtle). Your text is never sent to a server.