Free Online Hash Generator

Compute SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or any file — instantly and privately, using your browser's built-in Web Crypto API. No data ever leaves your device.

What is a Cryptographic Hash?

A cryptographic hash function takes an input of any size and produces a fixed-length output called a digest or hash. The same input always produces the same hash, but even a single character change results in a completely different output. Hashes are one-way — you cannot reverse a hash to recover the original input.

Common uses include verifying file integrity, storing passwords securely (with salting), signing digital documents, and detecting data tampering.

Supported Hash Algorithms

AlgorithmOutput LengthSecurity StatusCommon Use
SHA-1160 bits (40 hex chars)⚠️ Deprecated for securityGit commit IDs, legacy checksums
SHA-256256 bits (64 hex chars)✅ SecureBitcoin, TLS, file verification
SHA-384384 bits (96 hex chars)✅ SecureTLS certificates, HMAC
SHA-512512 bits (128 hex chars)✅ SecurePassword hashing, HMAC-SHA-512

How to Use

  1. Choose Text or File input mode.
  2. For text: type or paste your input, then click Hash or press Cmd/Ctrl + Enter.
  3. For files: drag and drop any file onto the drop zone, or click to browse. Hashing starts automatically.
  4. All four hash outputs appear below. Hover over any row to copy a single hash.
  5. Toggle UPPERCASE if your target system requires uppercase hex.

Frequently Asked Questions

Why isn't MD5 included?

MD5 is not supported by the browser's native crypto.subtle Web Crypto API because it is considered cryptographically broken — MD5 is vulnerable to collision attacks (two different inputs can produce the same hash). For any security purpose, use SHA-256 or higher. For non-security checksums where MD5 is required by a legacy system, use a dedicated MD5 tool.

Can I hash large files?

Yes. File hashing uses crypto.subtle.digest() directly on the file's ArrayBuffer. It runs entirely in your browser — no upload required — so file size is only limited by your available RAM.

How do I verify a file download?

Download the file, then drop it into the File tab here. Compare the SHA-256 hash shown with the checksum published by the file's provider. If they match exactly, the file has not been tampered with.

Is a hash the same as encryption?

No. Encryption is reversible — a key can decrypt the ciphertext back to the original data. Hashing is irreversible by design — you cannot recover the input from a hash. This makes hashing ideal for verification and password storage, while encryption is used for confidential communication.