Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 hashes for any text
About Cryptographic Hashes
A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a fixed-size bit array. The output is deterministic - the same input always produces the same hash.
Hash Algorithms
- MD5: 128-bit hash, fast but cryptographically broken. Use only for checksums, not security.
- SHA-1: 160-bit hash, deprecated for security use. Still used in some legacy systems.
- SHA-256: 256-bit hash, widely used and secure. Part of SHA-2 family.
- SHA-384: 384-bit hash, truncated version of SHA-512.
- SHA-512: 512-bit hash, highest security in SHA-2 family.
Common Uses
- Password storage (combined with salt)
- File integrity verification
- Digital signatures
- Data deduplication
- Blockchain and cryptocurrency