Hash Generator
Generate SHA-1, SHA-256, and SHA-512 hashes from any text.
—
—
—
Frequently Asked Questions
What is a cryptographic hash?
A hash function takes input text and produces a fixed-length string. The same input always produces the same output, but even a tiny change produces a completely different hash.
Which algorithm should I use?
SHA-256 is the most widely used today. SHA-512 offers more security. SHA-1 is considered weak and should not be used for security-sensitive purposes.
Can I reverse a hash to get the original text?
No. Hash functions are one-way. It is computationally infeasible to reverse a SHA-256 or SHA-512 hash.
Is my text sent anywhere?
No. Hashing runs entirely in your browser using the Web Crypto API.