Hash Generator
Generate SHA-1, SHA-256, SHA-384 and SHA-512 cryptographic hashes from any text.
Input text
Cryptographic hash functions
A hash function maps any input to a fixed-size digest. Properties: deterministic, fast, one-way, collision-resistant. One bit change β completely different hash (avalanche effect).
- SHA-1: 160 bits β broken, avoid
- SHA-256: 256 bits β Bitcoin, SSL, passwords
- SHA-384: 384 bits β TLS 1.3, high-security APIs
- SHA-512: 512 bits β archives
What this tool does
Generates cryptographic hash digests of any text using SHA-1, SHA-256, SHA-384 and SHA-512. Hashes are one-way: the same input always produces the same hash, but the hash cannot be reversed.
Input fields explained
Input text
The text to hash. Any change β even one character or added space β produces a completely different hash. This is called the avalanche effect.
π‘ Tips & context
βSHA-256 is the industry standard for integrity verification, digital signatures, and Bitcoin.
βDo NOT use SHA-1 for security-critical applications β it is considered weak.
βHashes are used to verify file integrity: compare the hash of a downloaded file to the published hash.
Formula / How it works
SHA family: deterministic, one-way, collision-resistant. SHA-256 most widely used.