Hash Generator — MD5, SHA-1, SHA-256, SHA-512
Generate cryptographic hashes from any text. Copy individual hashes or all at once.
Why This Technology Metric Matters
Why: Hashes are used for file integrity, password storage (with salt), and digital signatures.
How: MD5 uses custom JS; SHA uses Web Crypto API. Same input always produces same output.
- ●MD5/SHA-1 deprecated for security
- ●SHA-256 used by Bitcoin
- ●Always salt passwords
Sample Scenarios — Click to Load
Inputs
Hash Summary
Input
Output
⚠️For educational and informational purposes only. Verify with a qualified professional.
🔧 Tech Milestones
SHA-256 used by Bitcoin
— Blockchain
MD5 has collision attacks
— Crypto
Hash functions produce fixed-size output from arbitrary input. MD5 (32 hex) and SHA-1 (40 hex) are deprecated for security. SHA-256 (64 hex) and SHA-512 (128 hex) are recommended. Hashes are one-way.
Frequently Asked Questions
Why is MD5 considered insecure?
MD5 has known collision vulnerabilities. Attackers can create two different inputs that produce the same hash. Use SHA-256 or SHA-512 for security-sensitive applications.
What is the difference between SHA-256 and SHA-512?
SHA-512 produces longer hashes (128 hex chars) and can be faster on 64-bit systems. SHA-256 (64 hex chars) is sufficient for most use cases and is widely supported.
Can I reverse a hash to get the original text?
No. Hash functions are one-way. You can only verify by hashing the input again and comparing. Rainbow tables can crack weak passwords by precomputing hashes.
What are hashes used for?
File integrity verification, password storage (with salt), digital signatures, blockchain, and checksums. Never store passwords as plain MD5 or SHA-1.
Does empty string produce a hash?
Yes. Empty string has valid hashes: MD5=d41d8cd98f00b204e9800998ecf8427e, SHA-256=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.
Why does SHA take a moment?
SHA uses the Web Crypto API which runs asynchronously. MD5 is computed synchronously in JavaScript.