Calcorithmevery number has an answer
πŸ”
All tools β†’
← Generators

Hash Generator

Generate SHA-1, SHA-256, SHA-384 and SHA-512 cryptographic hashes from any text.

Input texti

Cryptographic hash functions

A hash function maps any input to a fixed-size digest. Properties: deterministic, fast, one-way, collision-resistant. One bit change β†’ completely different hash (avalanche effect).

  • SHA-1: 160 bits β€” broken, avoid
  • SHA-256: 256 bits β€” Bitcoin, SSL, passwords
  • SHA-384: 384 bits β€” TLS 1.3, high-security APIs
  • SHA-512: 512 bits β€” archives
What this tool does

Generates cryptographic hash digests of any text using SHA-1, SHA-256, SHA-384 and SHA-512. Hashes are one-way: the same input always produces the same hash, but the hash cannot be reversed.

Input fields explained
Input text
The text to hash. Any change β€” even one character or added space β€” produces a completely different hash. This is called the avalanche effect.
πŸ’‘ Tips & context
β†’SHA-256 is the industry standard for integrity verification, digital signatures, and Bitcoin.
β†’Do NOT use SHA-1 for security-critical applications β€” it is considered weak.
β†’Hashes are used to verify file integrity: compare the hash of a downloaded file to the published hash.
iFormula / How it works

SHA family: deterministic, one-way, collision-resistant. SHA-256 most widely used.