Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 cryptographic hashes from any text. Computed in your browser — your data never leaves your device.
About the Hash Generator
A cryptographic hash function converts any input into a fixed-length string called a digest. The same input always produces the same hash, but changing even one character produces a completely different output. Hash functions are one-way: you cannot reverse a hash back to the original input, making them ideal for verifying data integrity and storing passwords.
Which algorithm should you use?
- MD5 (128-bit) — fast but cryptographically broken. Use for checksums only, never for passwords or security.
- SHA-1 (160-bit) — deprecated for security. Still found in legacy systems and Git object IDs.
- SHA-256 (256-bit) — the current standard for TLS, code signing, and Bitcoin. Recommended for new applications.
- SHA-512 (512-bit) — maximum collision resistance. Used in high-security contexts.
How to verify a file integrity hash
Download a file and the publisher's expected hash. Run sha256sum filename on Linux/Mac, or Get-FileHash filename in PowerShell. Compare the output character by character — if they match exactly, the file has not been tampered with.
Hashing in authentication systems
Modern authentication stores a salted hash of the password rather than the password itself. When a user logs in, the server hashes the provided password with the stored salt and compares the result to the stored hash — the plaintext password is never stored or transmitted. This means a database breach does not immediately expose user passwords, though weak passwords remain crackable via rainbow tables.
- Salt — a random value added to each password before hashing; prevents identical passwords from having identical hashes
- Pepper — a secret value stored server-side (not in the database) added to passwords; adds an extra layer
- bcrypt — a purpose-built slow password hash with adjustable work factor; current best practice
- PBKDF2 — key derivation function used in WPA2 passwords and many legacy authentication systems
Frequently Asked Questions
echo -n "your text" | sha256sum. Windows PowerShell: Write-Host ([System.BitConverter]::ToString([System.Security.Cryptography.SHA256]::Create().ComputeHash([System.Text.Encoding]::UTF8.GetBytes("your text"))) -replace "-","").