Hash Generator
Generate SHA-256, SHA-384, SHA-512, and SHA-1 hashes from any text.
What is a Hash?
A cryptographic hash function takes an input and produces a fixed-size string of bytes. The output (hash) is deterministic — the same input always produces the same hash — but it's computationally infeasible to reverse the process.
Hashes are used for data integrity verification, password storage, digital signatures, and more.
Hash Algorithms
- SHA-256: 256-bit hash, widely used and recommended for most purposes
- SHA-384: 384-bit hash, truncated version of SHA-512
- SHA-512: 512-bit hash, maximum security
- SHA-1: 160-bit hash, deprecated for security use but still common for checksums
Common Use Cases
- Verifying file integrity
- Password hashing (with proper salting)
- Digital signatures
- Data deduplication
- Blockchain and cryptocurrencies