~/devtools / hash
tool::hash

Hash
Generator

Generate MD5, SHA-1, SHA-256, and SHA-512 hashes for text or files simultaneously. Use for integrity verification and checksums.

ad · 728×90
// Hash Algorithms
MD5 (128-bit) and SHA-1 (160-bit) are for checksums only. For security, use SHA-256 (256-bit) or higher.
Text Input
ad · 300×250
// about this tool

What is a Hash Function?

A hash function converts data of any length into a fixed-length output called a hash or digest. The same input always produces the same hash, and even a tiny change in the input produces a completely different output — a property called the avalanche effect.

MD5 and SHA-1 are no longer considered secure for cryptographic purposes, but they remain useful for non-security tasks like file checksums and cache keys. For passwords, digital signatures, and other security-sensitive uses, SHA-256 or higher is required.

This tool supports both text input and file upload, displaying MD5, SHA-1, SHA-256, and SHA-512 hashes simultaneously. SHA-* hashes are computed using the browser's built-in Web Crypto API; MD5 is computed in pure JavaScript.

Use Cases
  • Verify the integrity of a downloaded file using its SHA-256 hash
  • Quickly compare two files by checking if their hashes match
  • Debug SHA-256 HMAC signatures for API request signing
  • Generate MD5 checksums for legacy system compatibility
  • Understand how Git uses SHA-1 for commit hashes
FAQ
Q. Should I use MD5 or SHA-256?
For security purposes (passwords, digital signatures), always use SHA-256 or higher. MD5 and SHA-1 have known collision vulnerabilities and are no longer safe for cryptographic use. For simple checksum or deduplication tasks, MD5 is still acceptable.
Q. Can a hash be reversed to get the original data?
No. Hash functions are one-way by design — it is computationally infeasible to recover the original input from the hash. However, short or common strings can be looked up in precomputed rainbow tables, which is why passwords need salting in addition to hashing.
Q. Can the same file produce different hashes?
No, not under normal circumstances. If the hashes differ, the files are different — perhaps due to modification, malware injection, or a transmission error. This is exactly why software distributions provide SHA-256 checksums alongside downloads.
// related tools
id
UUID Generator
Generate RFC 4122 UUID v4 identifiers. Bulk generate up to 20 with individual copy.
pw
Password Generator
Generate secure random passwords with configurable length and character sets. Strength meter included.
Lm
Lorem Ipsum Generator
Generate placeholder text by paragraphs, sentences, or words. English and Korean options.
b64
Base64 Encoder
Encode and decode Base64 strings. Supports text, URLs, and binary data.