Free Online Hash Generator
Compute SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or any file — instantly and privately, using your browser's built-in Web Crypto API. No data ever leaves your device.
What is a Cryptographic Hash?
A cryptographic hash function takes an input of any size and produces a fixed-length output called a digest or hash. The same input always produces the same hash, but even a single character change results in a completely different output. Hashes are one-way — you cannot reverse a hash to recover the original input.
Common uses include verifying file integrity, storing passwords securely (with salting), signing digital documents, and detecting data tampering.
Supported Hash Algorithms
| Algorithm | Output Length | Security Status | Common Use |
|---|---|---|---|
| SHA-1 | 160 bits (40 hex chars) | ⚠️ Deprecated for security | Git commit IDs, legacy checksums |
| SHA-256 | 256 bits (64 hex chars) | ✅ Secure | Bitcoin, TLS, file verification |
| SHA-384 | 384 bits (96 hex chars) | ✅ Secure | TLS certificates, HMAC |
| SHA-512 | 512 bits (128 hex chars) | ✅ Secure | Password hashing, HMAC-SHA-512 |
How to Use
- Choose Text or File input mode.
- For text: type or paste your input, then click Hash or press
Cmd/Ctrl + Enter. - For files: drag and drop any file onto the drop zone, or click to browse. Hashing starts automatically.
- All four hash outputs appear below. Hover over any row to copy a single hash.
- Toggle UPPERCASE if your target system requires uppercase hex.
Frequently Asked Questions
Why isn't MD5 included?
MD5 is not supported by the browser's native crypto.subtle Web Crypto API because it is considered cryptographically broken — MD5 is vulnerable to collision attacks (two different inputs can produce the same hash). For any security purpose, use SHA-256 or higher. For non-security checksums where MD5 is required by a legacy system, use a dedicated MD5 tool.
Can I hash large files?
Yes. File hashing uses crypto.subtle.digest() directly on the file's ArrayBuffer. It runs entirely in your browser — no upload required — so file size is only limited by your available RAM.
How do I verify a file download?
Download the file, then drop it into the File tab here. Compare the SHA-256 hash shown with the checksum published by the file's provider. If they match exactly, the file has not been tampered with.
Is a hash the same as encryption?
No. Encryption is reversible — a key can decrypt the ciphertext back to the original data. Hashing is irreversible by design — you cannot recover the input from a hash. This makes hashing ideal for verification and password storage, while encryption is used for confidential communication.