Hash Generator
Generate SHA-256, SHA-512, and SHA-1 hashes from any text.
SHA-256(256-bit / 64 hex)
Hash will appear here...
SHA-512(512-bit / 128 hex)
Hash will appear here...
SHA-1(160-bit / 40 hex)
Hash will appear here...
About This Tool
A cryptographic hash function takes an input and produces a fixed-size output (the 'hash' or 'digest'). The same input always produces the exact same hash, but even a tiny change in input changes the hash completely. Hashes are one-way — you cannot derive the original text from the hash.
When to Use
- Verifying file integrity: compare a downloaded file's SHA-256 against the publisher's checksum.
- Storing passwords (using a slow hash like bcrypt is better, but SHA-256 works for learning).
- Generating a fingerprint for an object/data structure.
- Creating cache keys based on content rather than URL.
Practical Examples
SHA-256 of "hello"2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
Checksum VerificationRun hash on a downloaded .zip → paste publisher's expected hash → compare visually.
Common Mistakes to Avoid
- Using MD5 or SHA-1 for security-sensitive applications. They have known collisions.
- Storing raw SHA-256 passwords without salting. Always use bcrypt/argon2 in production.
Frequently Asked Questions
Q. Is this computation done server-side?A. No. This tool uses your browser's built-in Web Crypto API (SubtleCrypto) entirely client-side. Your input data never leaves your machine.
Q. Why isn't MD5 included?A. MD5 is not supported by the browser's SubtleCrypto API as it's considered cryptographically broken. Use SHA-256 instead.