Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text. Click a hash to copy.
A hash function takes any input and produces a fixed-size string of characters. The same input always produces the same hash, but even a tiny change produces a completely different hash. Hashes are one-way — you cannot reverse them to get the original input.
MD5: 128-bit hash, fast but considered cryptographically broken. Still used for checksums.
SHA-1: 160-bit hash, deprecated for security but still in legacy systems.
SHA-256: 256-bit hash, part of SHA-2 family. Widely used and considered secure. Used in Bitcoin, SSL, and more.
SHA-512: 512-bit hash, strongest option here. Used in high-security applications.
Password storage, file integrity verification, digital signatures, blockchain, data deduplication, and caching.