Security Hash Generator
Generate SHA-1, SHA-256, SHA-384 and SHA-512 hashes from text or files using the Web Crypto API.
How to Use the Security Hash Generator
Enter text or upload a file, then click "Generate Hashes" to compute SHA-1, SHA-256, SHA-384 and SHA-512 hashes simultaneously. Toggle "Uppercase" to switch between lowercase and uppercase hex output. Click "Copy" next to any hash to copy it to your clipboard.
Text vs File Hashing
- Text Input — hash any text string directly. Useful for verifying passwords, generating checksums for short content, or testing hash outputs.
- File Upload — hash any file to verify its integrity. Compare the hash with a known value to confirm the file has not been tampered with.
Supported Algorithms
- SHA-1 — 160-bit hash. Legacy use only — not recommended for security.
- SHA-256 — 256-bit hash. Industry standard for data integrity and digital signatures.
- SHA-384 — 384-bit hash. Higher security margin than SHA-256.
- SHA-512 — 512-bit hash. Maximum security, faster on 64-bit systems.
Frequently Asked Questions
Is my data sent to a server?
No. All hashing is performed in your browser using the Web Crypto API (SubtleCrypto). Your text and files never leave your device.
Can I hash large files?
Yes. The Web Crypto API can hash files of any size. However, very large files may take a moment to process since the entire file must be read into memory.
Which hash algorithm should I use?
SHA-256 is the most widely used and recommended for general purposes. SHA-512 provides extra security margin. Avoid SHA-1 for security-critical applications.
Can I reverse a hash back to the original data?
No. Cryptographic hash functions are one-way — you cannot derive the original input from a hash output. This property makes them useful for integrity verification and password storage.
Why is MD5 not included?
MD5 is not available in the Web Crypto API. It is also cryptographically broken and should not be used for security purposes. SHA-256 is the recommended replacement.
More Security & Privacy
Password Generator
Generate cryptographically secure random passwords with configurable length, character types and entropy display.
Open tool →Password Strength Checker
Check password strength with entropy calculation, pattern detection and common password matching.
Open tool →TOTP Generator
Generate time-based one-time passwords (TOTP) from a base32 secret with live 30-second countdown.
Open tool →CSP Header Generator
Build Content-Security-Policy headers with a visual form, presets and per-directive configuration.
Open tool →AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM and PBKDF2 key derivation, entirely in the browser.
Open tool →RSA Key Generator
Generate RSA key pairs (2048 or 4096 bit) in PEM format using the Web Crypto API.
Open tool →