Hash Generator

Generate SHA-256, SHA-512, and SHA-1 hashes from any text.

SHA-256(256-bit / 64 hex)
Hash will appear here...
SHA-512(512-bit / 128 hex)
Hash will appear here...
SHA-1(160-bit / 40 hex)
Hash will appear here...

About This Tool

A cryptographic hash function takes an input and produces a fixed-size output (the 'hash' or 'digest'). The same input always produces the exact same hash, but even a tiny change in input changes the hash completely. Hashes are one-way — you cannot derive the original text from the hash.

When to Use

  • Verifying file integrity: compare a downloaded file's SHA-256 against the publisher's checksum.
  • Storing passwords (using a slow hash like bcrypt is better, but SHA-256 works for learning).
  • Generating a fingerprint for an object/data structure.
  • Creating cache keys based on content rather than URL.

Practical Examples

SHA-256 of "hello"2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
Checksum VerificationRun hash on a downloaded .zip → paste publisher's expected hash → compare visually.

Common Mistakes to Avoid

  • Using MD5 or SHA-1 for security-sensitive applications. They have known collisions.
  • Storing raw SHA-256 passwords without salting. Always use bcrypt/argon2 in production.

Frequently Asked Questions

Q. Is this computation done server-side?A. No. This tool uses your browser's built-in Web Crypto API (SubtleCrypto) entirely client-side. Your input data never leaves your machine.
Q. Why isn't MD5 included?A. MD5 is not supported by the browser's SubtleCrypto API as it's considered cryptographically broken. Use SHA-256 instead.

Related Tools