Hash Generator

Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 hashes for any text

Algorithm

About Cryptographic Hashes

A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a fixed-size bit array. The output is deterministic - the same input always produces the same hash.

Hash Algorithms

  • MD5: 128-bit hash, fast but cryptographically broken. Use only for checksums, not security.
  • SHA-1: 160-bit hash, deprecated for security use. Still used in some legacy systems.
  • SHA-256: 256-bit hash, widely used and secure. Part of SHA-2 family.
  • SHA-384: 384-bit hash, truncated version of SHA-512.
  • SHA-512: 512-bit hash, highest security in SHA-2 family.

Common Uses

  • Password storage (combined with salt)
  • File integrity verification
  • Digital signatures
  • Data deduplication
  • Blockchain and cryptocurrency