Generate cryptographic hashes of any text. Supports SHA-256, SHA-1, and SHA-512.
Generate SHA-256, SHA-1, and SHA-512 cryptographic hashes from any text. Used for verifying data integrity, generating checksums, password hashing concepts, and any development workflow that involves hash functions. All processing happens in your browser.
SHA-256 produces a 64-character hash and is the current standard for most applications (Bitcoin, SSL certificates, code signing). SHA-1 produces a 40-character hash but is considered deprecated for security — use it only for legacy compatibility. SHA-512 produces a 128-character hash and is used in high-security contexts. For most purposes, SHA-256 is the right choice.
Verifying file integrity (checking if a download was corrupted), creating data fingerprints, password storage concepts (though real password hashing uses bcrypt or argon2), digital signatures, blockchain technology, and deduplication (detecting identical content without comparing the full content). Developers and security professionals use hashes daily.