Hash Generator (MD5, SHA-1, SHA-256, SHA-512)

Generate cryptographic hashes from text using the Web Crypto API. All hashing happens in your browser.

Input Text
MD5 deprecated
β€”
SHA-1 deprecated
β€”
SHA-256
β€”
SHA-384
β€”
SHA-512
β€”

What is a Cryptographic Hash?

A hash function takes any input and produces a fixed-size output (a "digest"). Good hash functions are deterministic, fast to compute, and infeasible to reverse β€” making them ideal for integrity checks and checksums.

Which hash should I use?

  • SHA-256 β€” Modern standard for integrity, digital signatures, blockchain
  • SHA-384 / SHA-512 β€” Stronger variants; required by some compliance regimes
  • MD5 & SHA-1 β€” Cryptographically broken. OK for non-security checksums only

Important Security Note

For storing user passwords, never use plain SHA-256. Use a slow, salted KDF like bcrypt, scrypt, or Argon2.

FAQ

Why is MD5 deprecated?
Practical collision attacks exist for MD5 since 2004. It can still be used for non-security checksums (e.g. ETags) but never for authentication or signatures.