Hash Generator - MD5, SHA-1, SHA-256, SHA-384, SHA-512 in your browser
Free online hash calculator. Compute MD5, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 digests of any text instantly. All hashing runs locally in your browser - your input is never sent to a server, making it safe for API keys, passwords, and other sensitive data.
Input
Hashes refresh while you type. Whitespace and line breaks are included exactly as entered.
SHA-1
SHA-224
SHA-256
SHA-384
SHA-512
Algorithm comparison
Side-by-side comparison of MD5, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 with output sizes, security status, and recommended use cases.
How hash functions work
A hash function takes any input - a single character or an entire file - and produces a fixed-length string called a digest. Feed the same input twice and you always get the exact same output. Change even one byte and the digest changes completely. This is the avalanche effect.
Hashing is a one-way operation: there is no mathematical inverse that reconstructs the original input from its digest. That property makes hashes useful for verifying file integrity without storing the file itself, and for confirming a password matches without ever saving the plaintext.
Collision resistance is what separates modern algorithms from deprecated ones. A collision occurs when two different inputs produce the same digest. MD5 and SHA-1 are vulnerable to crafted collisions, which is why they are no longer trusted for security-sensitive tasks. SHA-256 and above have no known practical collisions.
Choosing the right algorithm
- MD5 Only for non-security checksums where legacy tools require it. Never for passwords or signatures.
- SHA-1 Avoid for new projects. Acceptable only when interoperating with systems that have not yet migrated.
- SHA-256 The safe default for most uses: file verification, API request signing, HMAC keys.
- SHA-512 Prefer when building a password-hashing pipeline or when a larger digest is needed for extra margin.
- SHA-384 Use for browser subresource integrity (SRI) attributes and TLS 1.3 compatible cipher negotiation.
- SHA-224 Niche use in constrained devices or protocols with a hard limit on digest size.
Frequently asked questions
Common questions about hash functions and how to use them safely.
More privacy tools
Everything you need to share private data safely - free, no account, runs in your browser.
SecretNote
Write a private note, generate a one-time link, and share it. The note self-destructs the moment it is read - nothing is stored, nothing leaks.
SecretScreen
Upload a screenshot and get a self-destructing share link. The image is encrypted before upload and deleted after the first view - no permanent hosting.
SecretFile
Upload any file and share a one-time download link. The file is encrypted end-to-end and permanently deleted after the recipient downloads it.
Hash Generator
Instantly generate MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 hashes in your browser. Your input is never sent to the server.
Password Generator
Generate strong, random passwords with full control over length and character sets. Everything runs locally - your passwords never touch a server.