Generate cryptographic hashes from any text input. Supports SHA-1, SHA-256, and SHA-512. Runs in your browser.
Cryptographic hash functions take any input and produce a fixed-size fingerprint. They are fundamental to computer security, used for password storage, data integrity verification, digital signatures, and blockchain technology.
SHA-256 is the most widely used hash today — the standard for SSL certificates, Bitcoin, and password hashing. SHA-512 offers higher security for sensitive applications. SHA-1 is considered weak and should be avoided for security-critical work.
A hash function takes an input of any size and produces a fixed-size string. The same input always produces the same hash, but reversing it is computationally infeasible.
They differ in output length and security. SHA-1 is 160-bit (considered weak). SHA-256 is 256-bit and the current standard. SHA-512 is 512-bit for maximum security.
No. Hash functions are one-way — you cannot recover the original input from a hash.