Generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes from text or files. Hashes update live as you type. Uses browser's native crypto — no upload needed.
A cryptographic hash function converts any input (text or file) into a fixed-length string of characters. The same input always produces the same hash, but even a tiny change produces a completely different hash. Hashes are one-way — you cannot reverse a hash to get the original input.
Common uses: Verifying file integrity (compare hash before and after download), storing passwords securely, digital signatures, checksums, and data deduplication.
Note on MD5 and SHA-1: These are considered cryptographically broken for security purposes but are still widely used for non-security checksums and file verification.
Powered by the browser's native Web Crypto API — no libraries needed. Updated: May 2025