Hash Generator & Verifier
Generate, verify, and identify cryptographic hashes. All processing happens locally in your browser.
Enter Text
Options
Select Algorithms
Algorithm Reference
Message Digest Algorithm 5 - widely used but cryptographically broken
- File checksums (non-security)
- Data deduplication
- Legacy systems
Collision attacks demonstrated in 2004. Can be broken in seconds. Use SHA-256 instead.
Secure Hash Algorithm 1 - deprecated but still widely used
- Git commits
- Legacy SSL certificates
- File verification
Collision attacks demonstrated in 2017. Migrate to SHA-256 for security applications.
Industry standard secure hash function from SHA-2 family
- Bitcoin
- SSL/TLS
- Code signing
No known attacks. Recommended for most security applications.
Truncated SHA-512 with 384-bit output
- TLS
- Government applications
- High-security systems
NIST approved. Excellent security for sensitive applications.
Maximum security SHA-2 variant with 512-bit output
- High-security applications
- Linux passwords (/etc/shadow)
- Sensitive data
Excellent for security-critical applications. Faster than SHA-256 on 64-bit systems.
Keccak-based hash, SHA-3 standard with 256-bit output
- Modern cryptographic applications
- Post-quantum readiness
Excellent alternative to SHA-256 with different internal structure.
Keccak-based hash, SHA-3 standard with 512-bit output
- High-security applications
- Post-quantum readiness
Modern alternative to SHA-512 with different internal structure.
European hash standard, used in Bitcoin addresses
- Bitcoin addresses
- PGP
- Some cryptocurrency applications
Still considered secure but SHA-256 is generally preferred.
High-speed cryptographic hash, faster than MD5 while being secure
- Password hashing
- File verification
- Digital signatures
Faster than SHA-256 with equivalent security. Excellent choice for performance.
BLAKE2 variant optimized for 32-bit platforms
- Embedded systems
- IoT devices
- Mobile applications
Optimized for 32-bit platforms while maintaining full security.
Understanding Cryptographic Hashes
What is a Hash?
A cryptographic hash function is a mathematical algorithm that converts input data of any size into a fixed-size output (the hash or digest). Hash functions are one-way: you cannot reverse a hash to get the original input.
"Hello"185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969Key Properties
- Deterministic: Same input always produces same output
- One-way: Cannot reverse a hash to find the input
- Collision resistant: Hard to find two inputs with same hash
- Avalanche effect: Small input change = completely different hash
- Fixed size: Output is always the same length regardless of input
Common Use Cases
- File Integrity: Verify downloads haven't been corrupted
- Password Storage: Store password hashes, not plaintext
- Digital Signatures: Sign document hashes for authentication
- Blockchain: Chain blocks with cryptographic hashes
- Deduplication: Identify duplicate files by hash
- Version Control: Git uses SHA-1 for commit identification
Security Recommendations
- Use SHA-256 or SHA-512 for general security
- Use bcrypt, Argon2, or scrypt for password hashing
- Avoid MD5 and SHA-1 for security applications
- Use BLAKE2 or SHA-3 for high performance + security