Hash Generator
Compute SHA-1, SHA-256, SHA-384 and SHA-512 hashes of any text. Runs 100% in your browser using native Web Crypto — no upload, no tracking.
Start typing to see the hashes.
Note: MD5 and SHA-1 are cryptographically broken — use them only for non-security purposes like checksums. Prefer SHA-256 or SHA-512 for security.
What is a hash?
A cryptographic hash function takes arbitrary input and produces a fixed-size output (the hash or digest). Good hashes are deterministic (same input always gives same output), fast to compute, and infeasible to reverse. Any small change in input produces a completely different hash.
When to use each algorithm
SHA-256 is the standard for most security use cases — password storage (with salt + slow KDF), digital signatures, blockchain. SHA-512 is similar with a larger output. SHA-1 is deprecated for security but still used for checksums. MD5 is broken and should not be used for security.