Back to Tools

Hash Generator & Verifier

Generate, verify, and identify cryptographic hashes. All processing happens locally in your browser.

Privacy First: All hashing is done locally in your browser. Your data never leaves your device.

Enter Text

Options

Select Algorithms

Quick select:

Algorithm Reference

MD5Insecure
Output: 128 bits (32 hex chars)Speed: Very FastYear: 1991

Message Digest Algorithm 5 - widely used but cryptographically broken

Use for:
  • File checksums (non-security)
  • Data deduplication
  • Legacy systems

Collision attacks demonstrated in 2004. Can be broken in seconds. Use SHA-256 instead.

SHA-1Deprecated
Output: 160 bits (40 hex chars)Speed: Very FastYear: 1995

Secure Hash Algorithm 1 - deprecated but still widely used

Use for:
  • Git commits
  • Legacy SSL certificates
  • File verification

Collision attacks demonstrated in 2017. Migrate to SHA-256 for security applications.

SHA-256Secure
Output: 256 bits (64 hex chars)Speed: FastYear: 2001

Industry standard secure hash function from SHA-2 family

Use for:
  • Bitcoin
  • SSL/TLS
  • Code signing

No known attacks. Recommended for most security applications.

SHA-384Secure
Output: 384 bits (96 hex chars)Speed: FastYear: 2001

Truncated SHA-512 with 384-bit output

Use for:
  • TLS
  • Government applications
  • High-security systems

NIST approved. Excellent security for sensitive applications.

SHA-512Secure
Output: 512 bits (128 hex chars)Speed: FastYear: 2001

Maximum security SHA-2 variant with 512-bit output

Use for:
  • High-security applications
  • Linux passwords (/etc/shadow)
  • Sensitive data

Excellent for security-critical applications. Faster than SHA-256 on 64-bit systems.

SHA-3-256Secure
Output: 256 bits (64 hex chars)Speed: MediumYear: 2015

Keccak-based hash, SHA-3 standard with 256-bit output

Use for:
  • Modern cryptographic applications
  • Post-quantum readiness

Excellent alternative to SHA-256 with different internal structure.

SHA-3-512Secure
Output: 512 bits (128 hex chars)Speed: MediumYear: 2015

Keccak-based hash, SHA-3 standard with 512-bit output

Use for:
  • High-security applications
  • Post-quantum readiness

Modern alternative to SHA-512 with different internal structure.

RIPEMD-160Acceptable
Output: 160 bits (40 hex chars)Speed: FastYear: 1996

European hash standard, used in Bitcoin addresses

Use for:
  • Bitcoin addresses
  • PGP
  • Some cryptocurrency applications

Still considered secure but SHA-256 is generally preferred.

BLAKE2bSecure
Output: 512 bits (128 hex chars)Speed: Very FastYear: 2012

High-speed cryptographic hash, faster than MD5 while being secure

Use for:
  • Password hashing
  • File verification
  • Digital signatures

Faster than SHA-256 with equivalent security. Excellent choice for performance.

BLAKE2sSecure
Output: 256 bits (64 hex chars)Speed: Very FastYear: 2012

BLAKE2 variant optimized for 32-bit platforms

Use for:
  • Embedded systems
  • IoT devices
  • Mobile applications

Optimized for 32-bit platforms while maintaining full security.

Understanding Cryptographic Hashes

What is a Hash?

A cryptographic hash function is a mathematical algorithm that converts input data of any size into a fixed-size output (the hash or digest). Hash functions are one-way: you cannot reverse a hash to get the original input.

Input:"Hello"
SHA-256:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969

Key Properties

  • Deterministic: Same input always produces same output
  • One-way: Cannot reverse a hash to find the input
  • Collision resistant: Hard to find two inputs with same hash
  • Avalanche effect: Small input change = completely different hash
  • Fixed size: Output is always the same length regardless of input

Common Use Cases

  • File Integrity: Verify downloads haven't been corrupted
  • Password Storage: Store password hashes, not plaintext
  • Digital Signatures: Sign document hashes for authentication
  • Blockchain: Chain blocks with cryptographic hashes
  • Deduplication: Identify duplicate files by hash
  • Version Control: Git uses SHA-1 for commit identification

Security Recommendations

  • Use SHA-256 or SHA-512 for general security
  • Use bcrypt, Argon2, or scrypt for password hashing
  • Avoid MD5 and SHA-1 for security applications
  • Use BLAKE2 or SHA-3 for high performance + security