MD5
SHA-1
SHA-256
SHA-512

What is a Hash?

A hash function turns input text into a fixed-length fingerprint. Hashes are used for checksums, integrity checks, cache keys, signatures, and comparisons where you do not want to compare the original text directly.

This page generates MD5, SHA-1, SHA-256, and SHA-512 output. SHA-256 and SHA-512 are the better default choices for security-sensitive integrity checks. MD5 and SHA-1 remain useful for legacy checksums, but not for new security designs.

FAQ

Is MD5 still secure?

No. MD5 is cryptographically broken and should not be used for passwords, signatures, or trust decisions.

Which hash algorithm should I use?

Use SHA-256 or SHA-512 for modern integrity checks. Use dedicated password hashing algorithms such as Argon2, bcrypt, or scrypt for passwords.

Can a hash be reversed?

A hash is designed to be one-way. Weak inputs can still be guessed by brute force, so hashes are not a substitute for encryption.