Tools · Live
Hash Generator & Verifier,
MD5, SHA-1, SHA-256, SHA-512.
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text or files — instantly and entirely in your browser. Verify checksums with the built-in comparator. No data leaves your computer.
100% Client-Side. Your text and files are hashed entirely in your browser using the Web Crypto API. Nothing ever leaves your computer.
Type or paste text above
MD5 · SHA-1 · SHA-256 · SHA-512 hashes will appear here.
Hash guide
What are cryptographic hashes and when do you need them?
The core properties of hash functions
A cryptographic hash function takes an arbitrary amount of input data and produces a fixed-size "digest" (fingerprint). Good hash functions have three essential properties: (1) Determinism — the same input always produces the same output. (2) Avalanche effect— a tiny input change (even one bit) produces a completely different output. (3) One-way — given a hash, it is computationally infeasible to recover the original input.
MD5 and SHA-1: why they are deprecated for security
MD5 (1992) and SHA-1 (1995) are no longer considered cryptographically secure. Researchers have demonstrated collision attacks: the ability to craft two different inputs that produce the same hash. In 2017, Google demonstrated the first practical SHA-1 collision (the "SHAttered" attack). MD5 collisions can now be generated in seconds on a consumer laptop.
This means MD5 and SHA-1 should not be used for:
- Digital signatures or certificate validation
- Password hashing (use bcrypt, Argon2, or scrypt instead)
- Any context where collision resistance is a security requirement
They remain widely used for non-security-critical checksums: detecting accidental file corruption, deduplying content in storage systems, and legacy protocol compatibility. In these contexts, their speed and ubiquitous tool support make them practical.
SHA-256 and SHA-512: the current standard
SHA-256 and SHA-512 (part of the SHA-2 family, standardized in 2001) have no known practical attacks. SHA-256 is the most widely deployed — it is used in TLS certificates, Bitcoin mining, JWT signatures, Git commit IDs, S3 ETag headers, and package manager integrity checks (npm, pip, cargo). SHA-512 produces a larger digest and offers a slightly higher security margin, useful when future-proofing against quantum computing advances.
Practical uses for this tool
- File integrity verification: Download a file, hash it, and compare against the checksum published by the developer to confirm it was not corrupted or tampered with.
- Password hash identification: Identify what algorithm produced a hash by its length (32 hex chars = MD5, 40 = SHA-1, 64 = SHA-256, 128 = SHA-512).
- Content fingerprinting: Generate a stable, short identifier for any piece of content — useful for cache keys, ETags, or deduplication.
- Checksum generation: Produce checksums for configuration files, scripts, or build artifacts to detect accidental changes.