Hash Generator

Compute SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text.

SHA-1
SHA-256
SHA-384
SHA-512

FAQ

What is a cryptographic hash?

A hash function converts any input into a fixed-length string. The same input always produces the same hash, and even a tiny change in input produces a completely different hash. Hashes are one-way: you cannot reverse them to get the original input.

Which hash algorithm should I use?

SHA-256 is the most widely used for general purposes. SHA-512 offers more security. Avoid SHA-1 for security-sensitive use cases — it has known vulnerabilities.

Is my data sent to a server?

No. All hashing uses the Web Crypto API in your browser. Nothing is transmitted anywhere.