Advertisement
Hash Generator
Generate SHA-1, SHA-256, SHA-384 and SHA-512 cryptographic hashes from any text.
Advertisement
What is a cryptographic hash?
A hash function takes any input text and produces a fixed-length string of hexadecimal characters. The same input always produces the same hash. Even a tiny change in the input produces a completely different hash.
Hash algorithms supported
- SHA-1 — 160-bit hash (40 hex characters). Deprecated for security use but still common for checksums.
- SHA-256 — 256-bit hash (64 hex characters). The most widely used algorithm today, used in TLS, Bitcoin and code signing.
- SHA-384 — 384-bit variant of SHA-2, used in TLS certificates and HMAC.
- SHA-512 — 512-bit hash (128 hex characters). Maximum strength in the SHA-2 family.
Common uses for hashing
- Verifying file integrity (compare checksums)
- Storing passwords securely (with salt)
- Generating digital signatures
- Cache-busting in web development
- Creating unique identifiers from content
Is hashing the same as encryption?
No. Encryption is reversible — you can decrypt data with the right key. Hashing is a one-way function; you cannot recover the original text from a hash. This makes hashing ideal for passwords and integrity checks.
Is my text secure?
All hashing uses the browser's built-in Web Crypto API (crypto.subtle). Your text is never sent to a server.