Hash Generator

Generate cryptographic hashes using MD5, SHA-1, SHA-256, and SHA-512. All computation happens in your browser.

About Cryptographic Hashes

A cryptographic hash function maps data of arbitrary size to a fixed-size output. Hash functions are one-way — you cannot recover the original input from the hash. They are used for password storage, file integrity verification, digital signatures, and data deduplication.

Hash Comparison

AlgorithmOutput SizeSecurityUse Case
MD5128-bit (32 hex)BrokenChecksums only (not security)
SHA-1160-bit (40 hex)DeprecatedLegacy systems
SHA-256256-bit (64 hex)StrongGeneral purpose, Bitcoin
SHA-512512-bit (128 hex)StrongHigh security applications

Frequently Asked Questions

What is a hash function?
A hash function takes input data of any size and produces a fixed-size output (hash/digest). It's a one-way function — you can't reverse a hash to get the original data. Common uses include password storage, data integrity verification, and digital signatures.
What's the difference between MD5, SHA-1, and SHA-256?
MD5 produces a 128-bit hash, SHA-1 produces 160-bit, and SHA-256 produces 256-bit. MD5 and SHA-1 are considered cryptographically broken and should not be used for security. SHA-256 is currently the standard for secure hashing.
Can two different inputs produce the same hash?
Yes, this is called a 'collision.' While theoretically possible for any hash function, modern algorithms like SHA-256 make collisions practically impossible to find intentionally.
Keyboard Shortcuts
Ctrl+Enter Run / Format
Ctrl+Shift+C Copy output
Ctrl+L Clear