Hash Generator
Free online hash generator. Create MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes for text or files. Fast, browser-based and ready to use right away.
Drag file here or click to select
Hash Results
MD5 (128-bit)
Not recommended for cryptographic security
SHA-1 (160-bit)
Legacy, avoid for new applications
SHA-256 (256-bit)
Most common and a solid default for many integrity uses
SHA-384 (384-bit)
High security, longer output
SHA-512 (512-bit)
Longer output for stricter or more specialized workflows
What Are Hash Functions?
Hash functions convert input data (text or file) into a fixed-size string of characters, called a hash or digest. The same input always produces the same hash, but any change in input produces a completely different hash. This makes them useful for verifying data integrity and comparing content.
Common Hash Algorithms
- MD5 (128-bit): Produces 32-character hex string. DEPRECATED for security purposes but still used for checksums and file verification.
- SHA-1 (160-bit): 40-character hex string. Legacy algorithm, avoid for new cryptographic applications.
- SHA-256 (256-bit): 64-character hex string. Widely used for integrity checks, signatures, and general-purpose hashing.
- SHA-384 (384-bit): 96-character hex string. Longer digest for cases that specifically require it.
- SHA-512 (512-bit): 128-character hex string. Longer output from the SHA-2 family, useful when policies or integrations require it.
Use Cases for Hashing
- Password workflows: Compare or test digest outputs, though real password storage should use dedicated password-hashing functions
- File Integrity: Compare file hashes to verify files haven't been modified or corrupted
- Digital Signatures: Hash documents to create cryptographic signatures for authentication
- Checksums: Verify downloads haven't been tampered with
- Data Deduplication: Identify duplicate files by comparing their hashes
Why NOT Use MD5 for Security
MD5 has been cryptographically broken since 2004. Researchers have found practical collision attacks, meaning two different inputs can produce the same hash. For password storage, do not use general-purpose hashes alone at all: use dedicated password-hashing functions such as Argon2, scrypt, or bcrypt.
What is HMAC?
HMAC (Hash-based Message Authentication Code) combines a hash function with a secret key. It's used to verify both the integrity and authenticity of a message, unlike regular hashing which only verifies integrity. HMAC is commonly used in APIs for request signing and authentication.
FAQ
Can I reverse a hash to get the original text? No. Cryptographic hash functions are one-way by design. You cannot "decrypt" a hash.
Why is file hashing important? When downloading files from the internet, you can verify the hash matches the official value to ensure the file hasn't been modified or infected with malware.
Should I use Base64 or Hexadecimal? Both are equivalent representations of the same data. Hex is more human-readable, while Base64 is more compact (shorter output).