More Tools

About cryptographic hashes

Hashing is a fundamental technique in computer science. Common uses include verifying file integrity (checksums), storing passwords securely (with bcrypt/scrypt), digital signatures, and data deduplication.

Note that MD5 and SHA-1 are considered deprecated for security uses but remain useful for non-cryptographic checksums.

Frequently Asked Questions

What is a cryptographic hash?
A cryptographic hash function takes an input of any size and produces a fixed-size output (the hash or digest). The same input always produces the same hash, but even a tiny change in the input produces a completely different hash. Hashes are one-way — you cannot reverse them to recover the original text.
Which hash algorithm should I use?
For security purposes, use SHA-256 or SHA-512. MD5 and SHA-1 are considered cryptographically broken and should not be used for security-sensitive applications like password hashing or digital signatures. They are fine for checksums and non-security data integrity.
Can I use this for password hashing?
No — never use a simple hash for passwords. For passwords, use a slow, salted algorithm specifically designed for the purpose, such as bcrypt, scrypt, or Argon2. These prevent brute-force and rainbow table attacks.