Hash Generator
Generate SHA-1, SHA-256, SHA-384 and SHA-512 hashes from text.
How to Use the Hash Generator
Enter or paste your text into the input box and click "Generate Hashes" to compute SHA-1, SHA-256, SHA-384 and SHA-512 hashes simultaneously. Toggle "Uppercase" to switch between lowercase and uppercase hex output. Click "Copy" next to any hash to copy it to your clipboard.
What is a Hash?
A cryptographic hash function takes an input (message) and returns a fixed-size string of bytes. The output (digest) is unique to each unique input — even a single character change produces a completely different hash. Hashes are one-way functions: you cannot reverse a hash back to the original text.
Supported Algorithms
- SHA-1 — 160-bit (40 hex characters). Considered weak for security but still used for checksums and non-security purposes.
- SHA-256 — 256-bit (64 hex characters). Part of the SHA-2 family. Widely used in TLS, SSL, Bitcoin, and data integrity checks.
- SHA-384 — 384-bit (96 hex characters). A truncated version of SHA-512, offering higher security margin than SHA-256.
- SHA-512 — 512-bit (128 hex characters). The strongest SHA-2 variant, used when maximum security is required.
Frequently Asked Questions
Is my text sent to a server?
No. All hashing is done in your browser using the Web Crypto API (SubtleCrypto). Nothing is transmitted to any server.
Can I reverse a hash back to the original text?
No. Cryptographic hash functions are one-way — you cannot derive the original input from a hash. That is what makes them useful for passwords and integrity verification.
Which algorithm should I use?
For general-purpose integrity checks, SHA-256 is the most widely used and recommended. SHA-512 offers a larger output for extra security. Avoid SHA-1 for security-critical applications as it is considered cryptographically broken.
Why is MD5 not included?
MD5 is not supported by the Web Crypto API. It is also considered cryptographically broken and should not be used for security purposes. SHA-256 is the recommended replacement.
What is the difference between SHA-256 and SHA-512?
SHA-256 produces a 256-bit (32-byte) hash while SHA-512 produces a 512-bit (64-byte) hash. SHA-512 can be faster on 64-bit processors and provides a larger security margin.
More Developer Tools
JSON Formatter
Format, validate and minify JSON with syntax highlighting.
Open tool →Base64 Encode / Decode
Encode text to Base64 or decode Base64 back to text.
Open tool →UUID Generator
Generate UUID v4 identifiers, single or in bulk.
Open tool →Unix Timestamp Converter
Convert Unix timestamps to human-readable dates and back.
Open tool →URL Encode / Decode
Encode or decode URLs and query parameters.
Open tool →HTML Entity Encode / Decode
Encode special characters to HTML entities or decode them back.
Open tool →