Hash Generator
Generate cryptographic hashes from text or verify file checksums.
Hash Results
MD5
- SHA-1
- SHA-256
- SHA-384
- SHA-512
- File is processed locally, never uploaded.
File Checksums
MD5
- SHA-1
- SHA-256
- SHA-512
- Verification Result
Enter a hash and text/file to verify
About Cryptographic Hashes
A cryptographic hash function produces a fixed-size output (hash) from any input data. The same input always produces the same hash, but even a tiny change in input produces a completely different hash.
Hash Algorithm Comparison
| Algorithm | Output Size | Security | Use Case |
|---|---|---|---|
| MD5 | 128 bits (32 hex) | Broken | Legacy checksums only |
| SHA-1 | 160 bits (40 hex) | Weak | Git commits, legacy systems |
| SHA-256 | 256 bits (64 hex) | Strong | File integrity, TLS, Bitcoin |
| SHA-384 | 384 bits (96 hex) | Strong | High security applications |
| SHA-512 | 512 bits (128 hex) | Strong | High security, 64-bit systems |
Security Notice
MD5 and SHA-1 are considered cryptographically broken and should not be used for security purposes. Use SHA-256 or SHA-512 for any security-sensitive applications.