Hash Generator

Generate cryptographic hashes from text using SHA-1, SHA-256, SHA-384, or SHA-512.

Advertisement (728x90)

What a Hash Function Does

A cryptographic hash maps input data of any size to a fixed-size digest.

Algorithm Choice

  • SHA-256/384/512 are widely used secure SHA-2 options.
  • SHA-1 is deprecated for many security uses and kept mainly for compatibility.
  • Use HMAC or password-specific KDFs for authentication and password storage use cases.

Important Limitations

  • A hash is one-way integrity fingerprinting, not encryption.
  • For passwords, plain hashing is insufficient; use salted, slow KDFs.
  • This tool hashes text locally in your browser.

References