Hash Generator

Generate SHA-256, SHA-384, SHA-512, and SHA-1 hashes from any text.

What is a Hash?

A cryptographic hash function takes an input and produces a fixed-size string of bytes. The output (hash) is deterministic — the same input always produces the same hash — but it's computationally infeasible to reverse the process.

Hashes are used for data integrity verification, password storage, digital signatures, and more.

Hash Algorithms

  • SHA-256: 256-bit hash, widely used and recommended for most purposes
  • SHA-384: 384-bit hash, truncated version of SHA-512
  • SHA-512: 512-bit hash, maximum security
  • SHA-1: 160-bit hash, deprecated for security use but still common for checksums

Common Use Cases

  • Verifying file integrity
  • Password hashing (with proper salting)
  • Digital signatures
  • Data deduplication
  • Blockchain and cryptocurrencies