Hash Generator
Compute SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text.
SHA-1
—
SHA-256
—
SHA-384
—
SHA-512
—
FAQ
What is a cryptographic hash?
A hash function converts any input into a fixed-length string. The same input always produces the same hash, and even a tiny change in input produces a completely different hash. Hashes are one-way: you cannot reverse them to get the original input.
Which hash algorithm should I use?
SHA-256 is the most widely used for general purposes. SHA-512 offers more security. Avoid SHA-1 for security-sensitive use cases — it has known vulnerabilities.
Is my data sent to a server?
No. All hashing uses the Web Crypto API in your browser. Nothing is transmitted anywhere.