Hash Generator
Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text or file. Free online hash generator using browser Web Crypto API.
How to use
- Enter text in the input box.
- Click Generate Hashes to compute all hash values.
- Click Copy next to any hash to copy it.
- Or use Hash a File to hash file contents.
Related tools:
A cryptographic hash function converts any input (text, file, password) into a fixed-length string called a hash or digest. The same input always produces the same hash, but even a single character change produces a completely different hash. Hashes are one-way — you cannot reverse a hash to get the original input.
This tool uses the browser's built-in Web Crypto API, meaning your text and files never leave your device — all hashing happens locally. SHA-256 is the most widely used hash algorithm today, used in blockchain, digital signatures, and password storage (with salting). SHA-512 provides a longer digest for higher collision resistance.
Frequently Asked Questions
What is the difference between SHA-256 and SHA-512?
Both are part of the SHA-2 family. SHA-256 produces a 256-bit (64 hex character) digest; SHA-512 produces a 512-bit (128 hex character) digest. SHA-512 is stronger but produces longer output. For most uses, SHA-256 is sufficient.
Why is MD5 not included?
MD5 is cryptographically broken — researchers can generate two different inputs that produce the same MD5 hash (a collision). It should not be used for security purposes. SHA-256 or SHA-512 are the recommended alternatives.
Can I use this to verify a file download?
Yes. Hash the downloaded file using this tool and compare the result to the checksum provided by the software publisher. If they match, the file has not been tampered with.
Are hashes stored anywhere?
No. All computation happens entirely in your browser using the Web Crypto API. No text or file content is sent to any server.