~welcome
hash-generator

Hash Generator

md5 · sha-1 · sha-256 · sha-512

$ how-to-use

Enter text and select a hash algorithm (MD5, SHA-1, SHA-256, SHA-512). The hash is generated instantly. Click to copy the hash value.

What is Hashing?

A hash function takes any input and produces a fixed-length string of characters. The same input always produces the same hash, but even a tiny change in input produces a completely different hash. This makes hashes ideal for verifying data integrity.

Hashing is one-way — you cannot reverse a hash back to the original input. This is different from encryption, which is designed to be reversible with the right key. Hashes are used for password storage, file integrity checks, digital signatures, and data deduplication.

Hash Algorithms

MD5 (128-bit)

Fast but cryptographically broken. Still used for checksums and non-security purposes like cache keys and file deduplication.

SHA-1 (160-bit)

Deprecated for security use since 2017. Still seen in legacy systems and Git commit hashes (Git is transitioning to SHA-256).

SHA-256 (256-bit)

The current standard. Used in SSL/TLS, Bitcoin, code signing, and most modern security applications. Strong and widely supported.

SHA-512 (512-bit)

Longer output for higher security margin. Actually faster than SHA-256 on 64-bit processors. Used when extra collision resistance is needed.

FAQ

Can I reverse a hash?

No. Hash functions are one-way by design. You can't compute the original input from a hash. Rainbow table attacks exist for weak passwords, but properly salted hashes are infeasible to reverse.

Which algorithm should I use?

SHA-256 for security purposes. MD5 only for non-security checksums (file integrity, cache keys). Never use MD5 or SHA-1 for passwords or security.

Is my data private?

Yes. All hashing runs in your browser using the Web Crypto API. No data leaves your device.