Hash Generator

Generate cryptographic hashes from text or verify file checksums.

Hash Results

MD5
-
SHA-1
-
SHA-256
-
SHA-384
-
SHA-512
-
File is processed locally, never uploaded.

File Checksums

MD5
-
SHA-1
-
SHA-256
-
SHA-512
-

Verification Result

? Enter a hash and text/file to verify

About Cryptographic Hashes

A cryptographic hash function produces a fixed-size output (hash) from any input data. The same input always produces the same hash, but even a tiny change in input produces a completely different hash.

Hash Algorithm Comparison

Algorithm Output Size Security Use Case
MD5128 bits (32 hex)BrokenLegacy checksums only
SHA-1160 bits (40 hex)WeakGit commits, legacy systems
SHA-256256 bits (64 hex)StrongFile integrity, TLS, Bitcoin
SHA-384384 bits (96 hex)StrongHigh security applications
SHA-512512 bits (128 hex)StrongHigh security, 64-bit systems

Security Notice

MD5 and SHA-1 are considered cryptographically broken and should not be used for security purposes. Use SHA-256 or SHA-512 for any security-sensitive applications.