Hash Generator — MD5, SHA-1, SHA-256, SHA-512
// cryptographic hash generator
Compute MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes instantly in your browser. Works on text and files of any size. Nothing is uploaded — all hashing runs locally via the Web Crypto API.
input
0 chars
verify checksum
paste a known hash to compare
hashes
MD5
awaiting input…
SHA-1
awaiting input…
SHA-256
awaiting input…
SHA-384
awaiting input…
SHA-512
awaiting input…
algorithm reference
| MD5 | 128-bit | Fast, widely used, but cryptographically broken. Vulnerable to collision attacks. Use only for non-security checksums (e.g. file deduplication). broken |
| SHA-1 | 160-bit | Deprecated by NIST. Practical collision attacks demonstrated in 2017 (SHAttered). Avoid for new systems; still seen in legacy protocols and Git object IDs. legacy |
| SHA-256 | 256-bit | Part of SHA-2. The current standard for signatures, TLS certificates, blockchain, and HMAC. No known practical attacks. Recommended for most use cases. secure |
| SHA-384 | 384-bit | SHA-2 variant. Truncated SHA-512 offering better resistance than SHA-256 against length-extension attacks. Used in TLS 1.3 cipher suites. secure |
| SHA-512 | 512-bit | Largest SHA-2 variant. Faster than SHA-256 on 64-bit hardware. Use for high-security contexts: code signing, archival integrity, PBKDF2 base. secure |