HASH GENERATOR
MD5 · SHA-1 · SHA-256 · SHA-384 · SHA-512 — 100% local, nothing sent to server
Input Text
🔒 All hashing is performed locally in your browser using the Web Crypto API. Your text is never sent to any server.
Hash Output — All Algorithms
FREQUENTLY ASKED QUESTIONS
What is a hash and what is it used for?
A hash is a fixed-length string produced by running data through a mathematical algorithm. The same input always produces the same hash, but you can't reverse a hash to get the original text. Hashes are used for verifying file integrity, storing passwords securely, and digital signatures.
What is the difference between MD5 and SHA-256?
MD5 produces a 128-bit hash and is faster but considered cryptographically broken — it should not be used for security purposes. SHA-256 is part of the SHA-2 family, produces a 256-bit hash, and is considered secure for modern use. For security-critical applications, always use SHA-256 or SHA-512.
Can I use this to verify a file checksum?
This tool hashes text input. For file checksums, you would typically use a command-line tool or a dedicated file hasher. However, you can paste the text contents of small text files into the input area and compare the resulting hash with a published checksum.
Is the MD5 hash generated here accurate?
Yes. The SHA hashes use the browser's native Web Crypto API which is cryptographically accurate. The MD5 implementation is a pure JavaScript version that produces standard, correct MD5 hashes.