Hash Generator

Generate SHA-1, SHA-256, or SHA-512 hashes from any text. All processing happens in your browser.

Algorithm:

About Hashing

Cryptographic hash functions turn any input into a fixed-length fingerprint. They are one-way: you cannot recover the original text from the hash. Use hashes for checksums, verifying file integrity, or (with proper techniques) storing password digests. This tool uses the Web Crypto API so everything runs locally in your browser.

Frequently Asked Questions

What is a hash?
A hash is a one-way function that turns input (e.g. text) into a fixed-length string. The same input always gives the same hash. Small changes in input produce a completely different hash. Commonly used for checksums, passwords (with salt), and data integrity.
Is my data sent to a server?
No. Hashing is done entirely in your browser using the Web Crypto API. Your text never leaves your device.
What is the difference between SHA-1, SHA-256, and SHA-512?
SHA-1 produces a 160-bit (40 hex) hash and is now considered weak for security. SHA-256 produces 256-bit (64 hex) and SHA-512 produces 512-bit (128 hex) hashes; both are secure and widely used. SHA-512 is stronger but slower; SHA-256 is the usual choice for most applications.