Hash Generator

Generate MD5, SHA-1, SHA-256 and SHA-512 hashes from any text. All four algorithms calculated simultaneously with copy buttons

What's a Hash?

A hash function takes any input (text, file, anything) and produces a fixed-size string output. Same input always produces the same hash; different inputs produce different hashes. Common hash sizes: MD5 (128 bits, 32 hex chars), SHA-1 (160 bits, 40 hex chars), SHA-256 (256 bits, 64 hex chars), SHA-512 (512 bits, 128 hex chars).

Uses: file integrity checking (hash of downloaded file should match published hash), password storage (hash with salt, never the actual password), data deduplication (same content = same hash), cryptographic signatures, blockchain. SHA-256 is the modern standard for general use; SHA-1 and MD5 are deprecated for security purposes (collisions can be engineered).

Common Hash Algorithms

AlgorithmOutput SizeStatus
MD5128 bit (32 hex)Broken, file checksums only
SHA-1160 bit (40 hex)Deprecated for security
SHA-256256 bit (64 hex)Standard, recommended
SHA-512512 bit (128 hex)Highest security
SHA-3VariableModern alternative
BLAKE2VariableFaster than SHA, secure
Argon2VariablePassword hashing winner

Frequently Asked Questions

Can I reverse a hash to get the input?

No - hash functions are one-way. Reversing requires either the input itself or brute-forcing all possible inputs. For weak inputs (short passwords, common phrases), rainbow tables or dictionary attacks find the input quickly. For random/long inputs, reversal is computationally infeasible.

Should I use MD5 for passwords?

No - MD5 is broken for cryptographic purposes. Use Argon2 (preferred), bcrypt, or scrypt for password hashing. These are slow by design, making brute force impractical. SHA-256 is fine for non-password integrity checking.

More tools β†’