Hash Generator

Compute cryptographic hashes for any text input. All five algorithms recompute live as you type. Nothing leaves your browser.

AlgorithmHash
MD5
SHA-1
SHA-256
SHA-384
SHA-512

Which algorithm should I use?

  • MD5 — fast but cryptographically broken; fine for non-security checksums and content fingerprints only.
  • SHA-1 — also broken for collision resistance; still found in legacy systems.
  • SHA-256 — the modern default. Used by HTTPS, Bitcoin, signed-payload verification.
  • SHA-384 / SHA-512 — longer outputs, used when extra collision resistance matters.

How this works

SHA-1, SHA-256, SHA-384, and SHA-512 are computed via the browser's built-in Web Crypto API . MD5 (which the Web Crypto API does not expose) uses a small embedded JavaScript implementation. Either way, the hashing happens locally — your input is never sent to a server.