Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text. Uses the browser's native Web Crypto API for SHA variants. Instant and offline-capable.
A cryptographic hash function takes any input and produces a fixed-size output (the "hash" or "digest"). The same input always produces the same hash, but even a tiny change in the input completely changes the output. Hashes are one-way — you cannot reverse a hash to recover the original input.
Hashing is used everywhere in security: password storage, file integrity verification, digital signatures, blockchain, and data deduplication. When you log into a website, the server typically stores a hash of your password rather than the password itself.
MD5 produces a 128-bit hash. It is fast but considered cryptographically broken — collisions (different inputs producing the same hash) have been demonstrated. Use it only for checksums, not for security. SHA-1 (160-bit) is also deprecated for security use after collision attacks were proven feasible. SHA-256 and SHA-512 are part of the SHA-2 family and remain secure for all current applications. SHA-256 is the most widely used, including in Bitcoin and TLS certificates.
This tool uses the browser's native Web Crypto API for SHA variants, ensuring high performance and correctness. MD5 is computed using a pure JavaScript implementation since the Web Crypto API does not support MD5.