Hash Generator
Generate cryptographic hash values from text using MD5, SHA-1, SHA-256, SHA-384, and SHA-512. All client-side.
Enter text above to generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes.
About these algorithms
- MD5: Fast but cryptographically broken. Use only for checksums, not security.
- SHA-1: Deprecated for security. Still seen in legacy systems and Git commit hashes.
- SHA-256: The standard choice for most security applications. Used in Bitcoin and TLS.
- SHA-384: Truncated version of SHA-512. Used in some TLS configurations.
- SHA-512: Strongest option here. Better performance than SHA-256 on 64-bit systems.
Common use cases
- Verifying file integrity (compare hash before and after transfer)
- Generating unique identifiers from text
- Password hashing verification (compare against known hashes)
- Data deduplication checks
Salt & HMAC
Click the Salt / HMAC button to expand advanced options. Three modes are available:
- salt + text: Prepends the salt to your input before hashing. Common in simple password storage schemes. Example:
hash("mysalt" + "password") - text + salt: Appends the salt after your input. Used in some legacy systems.
- HMAC: Uses the standard HMAC construction (RFC 2104) with your salt as the key. This is the cryptographically correct way to combine a secret key with a message. Supported for SHA-1 through SHA-512 via the Web Crypto API.
Privacy
SHA hashes are computed using your browser's built-in Web Crypto API.
MD5 uses a lightweight JavaScript implementation. Nothing is sent to any server.