Generate MD5, SHA1, SHA256, and SHA512 hashes instantly. Supports text and file hashing.
A cryptographic hash function takes input data and produces a fixed-size string of bytes. The output (hash/digest) is deterministic: the same input always produces the same output. Hash functions are one-way: you cannot reverse a hash to find the original input.
| Algorithm | Output Size | Security | Use Case |
|---|---|---|---|
| MD5 | 128 bits (32 hex) | Broken | Checksums only (not security) |
| SHA-1 | 160 bits (40 hex) | Weak | Legacy systems (deprecated) |
| SHA-256 | 256 bits (64 hex) | Strong | Digital signatures, blockchain, TLS |
| SHA-384 | 384 bits (96 hex) | Strong | High-security applications |
| SHA-512 | 512 bits (128 hex) | Strong | Maximum security, file integrity |
Password storage: Hash passwords before storing in databases. Use bcrypt or Argon2 with salting for passwords (not raw SHA).
File integrity: Compare hash of downloaded file with published checksum to verify it wasn't tampered with.
Digital signatures: Hash a document, then encrypt the hash with a private key to create a digital signature.
Blockchain: Bitcoin uses SHA-256 for mining and block verification.