Generate cryptographic hashes from any text using MD5, SHA-1, SHA-256, and SHA-512 algorithms. Compare hash values to verify data integrity, generate checksums, or create fingerprints of text content. SHA hashes are computed using the browser's native Web Crypto API for maximum performance and security. All processing happens locally — your data never leaves your browser.
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text using the Web Crypto API.
A cryptographic hash function takes input data of any size and produces a fixed-size output (the hash or digest). The process is one-way — you cannot reverse a hash to recover the original input. Even a tiny change in the input produces a completely different hash (the avalanche effect).
This tool computes four common hash algorithms: MD5 (128-bit, implemented in JavaScript), SHA-1 (160-bit), SHA-256 (256-bit), and SHA-512 (512-bit). SHA hashes use the browser's native Web Crypto API for hardware-accelerated performance.
| Algorithm | Output Size | Security | Use Case |
|---|---|---|---|
| MD5 | 128 bits (32 hex chars) | Broken - not collision resistant | Checksums, non-security fingerprints |
| SHA-1 | 160 bits (40 hex chars) | Deprecated - collisions demonstrated | Legacy systems, git commits |
| SHA-256 | 256 bits (64 hex chars) | Strong - recommended for most uses | Digital signatures, certificates, blockchain |
| SHA-512 | 512 bits (128 hex chars) | Strong - extra security margin | High-security applications, password hashing base |
Compare hash values to confirm files haven't been modified or corrupted during download or transfer.
Identify duplicate content by comparing hash fingerprints instead of full content.
Understand how password hashing works (note: real password hashing uses bcrypt, scrypt, or Argon2 with salting).
SHA-256 and SHA-512 are used as building blocks in digital signature algorithms.
A mathematical function that converts input data into a fixed-size string of characters. It's deterministic (same input always produces same output) and one-way (you can't reverse it).
MD5 is cryptographically broken and should not be used for security purposes. However, it's still useful for non-security checksums and quick fingerprinting where collision resistance isn't required.
This tool hashes text input only. For file hashing, you would need to read the file contents first. The Web Crypto API supports ArrayBuffer input for file hashing.
Hashing is one-way (you can't get the original data back), while encryption is two-way (data can be decrypted with the correct key). Hashing produces a fixed-size output regardless of input size.