Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes. Compare and verify checksums.
What are Cryptographic Hash Functions?
A hash function takes input of any size and produces a fixed-length output (the "hash" or "digest"). Cryptographic hash functions are one-way — you cannot reverse a hash to recover the original input. Even a tiny change in input produces a completely different hash (the "avalanche effect").
MD5 (128-bit) and SHA-1 (160-bit) are considered broken for security purposes but still used for checksums and non-security applications. SHA-256 and SHA-512 from the SHA-2 family are the current standard for security-sensitive applications like TLS certificates, code signing, and password hashing.
SHA hashes are computed using the Web Crypto API — a native browser API that runs at near-native speed. MD5 uses a pure JavaScript implementation. Nothing leaves your device.