Hash Generator
Generate cryptographic hashes from text using SHA-1, SHA-256, SHA-384, or SHA-512.
Advertisement (728x90)
What a Hash Function Does
A cryptographic hash maps input data of any size to a fixed-size digest.
Algorithm Choice
- SHA-256/384/512 are widely used secure SHA-2 options.
- SHA-1 is deprecated for many security uses and kept mainly for compatibility.
- Use HMAC or password-specific KDFs for authentication and password storage use cases.
Important Limitations
- A hash is one-way integrity fingerprinting, not encryption.
- For passwords, plain hashing is insufficient; use salted, slow KDFs.
- This tool hashes text locally in your browser.