Acento

Hash Generator

Compute SHA-1, SHA-256, SHA-384 and SHA-512 hashes of any text. Runs 100% in your browser using native Web Crypto — no upload, no tracking.

Start typing to see the hashes.

Note: MD5 and SHA-1 are cryptographically broken — use them only for non-security purposes like checksums. Prefer SHA-256 or SHA-512 for security.

What is a hash?

A cryptographic hash function takes arbitrary input and produces a fixed-size output (the hash or digest). Good hashes are deterministic (same input always gives same output), fast to compute, and infeasible to reverse. Any small change in input produces a completely different hash.

When to use each algorithm

SHA-256 is the standard for most security use cases — password storage (with salt + slow KDF), digital signatures, blockchain. SHA-512 is similar with a larger output. SHA-1 is deprecated for security but still used for checksums. MD5 is broken and should not be used for security.