Hash Generator

Generate various types of hashes for your input text.

Input Text

Generated Hashes

Details

A hash function takes an input (or "message") and returns a fixed-size string of bytes, typically a digest, that is unique to the input. Hash functions are used for data integrity verification, password storage, and in various cryptographic protocols. Note: MD5 and SHA-1 are considered cryptographically broken and should not be used for security purposes, but are included for legacy compatibility or non-security use cases.

Examples

Generating MD5 Hash

Input: Hello World!
MD5: ed076287532e86365e841e92bfc50d8c

Generates a 128-bit MD5 hash. Commonly used for checksums.

Generating SHA-1 Hash

Input: Hello World!
SHA-1: 2ef7bde608ce5404e97d5f042f95f89f1c232871

Generates a 160-bit SHA-1 hash. Avoid for security.

Generating SHA-256 Hash

Input: Hello World!
SHA-256: 7f83b1657ff1fc53b92dc18148a1d65dfc2d4b1fa3d677284addd200126d9069

Generates a 256-bit SHA-2 hash. A common standard for security.

Generating SHA-512 Hash

Input: Hello World!
SHA-512: 861844d6704e8573fec34d967e20bcfef3d424cf48be04e2acdf016dee9819881e4143a63678678981522160749403c0645688149a05924766849094eff181ae

Generates a 512-bit SHA-2 hash, offering potentially higher security than SHA-256.