// hash generator

Hash Generator — MD5, SHA-1, SHA-256, SHA-512

// cryptographic hash generator

Compute MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes instantly in your browser. Works on text and files of any size. Nothing is uploaded — all hashing runs locally via the Web Crypto API.

input 0 chars
verify checksum paste a known hash to compare
hashes
MD5 awaiting input…
SHA-1 awaiting input…
SHA-256 awaiting input…
SHA-384 awaiting input…
SHA-512 awaiting input…
algorithm reference
MD5 128-bit Fast, widely used, but cryptographically broken. Vulnerable to collision attacks. Use only for non-security checksums (e.g. file deduplication). broken
SHA-1 160-bit Deprecated by NIST. Practical collision attacks demonstrated in 2017 (SHAttered). Avoid for new systems; still seen in legacy protocols and Git object IDs. legacy
SHA-256 256-bit Part of SHA-2. The current standard for signatures, TLS certificates, blockchain, and HMAC. No known practical attacks. Recommended for most use cases. secure
SHA-384 384-bit SHA-2 variant. Truncated SHA-512 offering better resistance than SHA-256 against length-extension attacks. Used in TLS 1.3 cipher suites. secure
SHA-512 512-bit Largest SHA-2 variant. Faster than SHA-256 on 64-bit hardware. Use for high-security contexts: code signing, archival integrity, PBKDF2 base. secure