Hash Generator
Compute cryptographic hashes for any text input. All five algorithms recompute live as you type. Nothing leaves your browser.
| Algorithm | Hash | |
|---|---|---|
| MD5 | — | |
| SHA-1 | — | |
| SHA-256 | — | |
| SHA-384 | — | |
| SHA-512 | — |
Which algorithm should I use?
- MD5 — fast but cryptographically broken; fine for non-security checksums and content fingerprints only.
- SHA-1 — also broken for collision resistance; still found in legacy systems.
- SHA-256 — the modern default. Used by HTTPS, Bitcoin, signed-payload verification.
- SHA-384 / SHA-512 — longer outputs, used when extra collision resistance matters.
How this works
SHA-1, SHA-256, SHA-384, and SHA-512 are computed via the browser's built-in Web Crypto API . MD5 (which the Web Crypto API does not expose) uses a small embedded JavaScript implementation. Either way, the hashing happens locally — your input is never sent to a server.