Hash Generator
Create MD5, SHA-1, SHA-256, and SHA-512 hashes from text. SHA hashes use the browser Web Crypto API.
What is a Hash?
A hash function turns input text into a fixed-length fingerprint. Hashes are used for checksums, integrity checks, cache keys, signatures, and comparisons where you do not want to compare the original text directly.
This page generates MD5, SHA-1, SHA-256, and SHA-512 output. SHA-256 and SHA-512 are the better default choices for security-sensitive integrity checks. MD5 and SHA-1 remain useful for legacy checksums, but not for new security designs.
FAQ
Is MD5 still secure?
No. MD5 is cryptographically broken and should not be used for passwords, signatures, or trust decisions.
Which hash algorithm should I use?
Use SHA-256 or SHA-512 for modern integrity checks. Use dedicated password hashing algorithms such as Argon2, bcrypt, or scrypt for passwords.
Can a hash be reversed?
A hash is designed to be one-way. Weak inputs can still be guessed by brute force, so hashes are not a substitute for encryption.