Hash Generator

Generate MD5, SHA-1, SHA-256, and SHA-512 cryptographic hashes from any text.

Overview

Generate MD5, SHA-1, SHA-256, and SHA-512 hash digests from any text input. Hashes are one-way functions: given the same input, the same hash is always produced, but the original input cannot be reconstructed from the hash. They are used in data integrity checks, password storage verification, file comparison, and digital signatures.

Common use cases

  • Verify that a downloaded file matches a published checksum.
  • Generate a reference hash to detect accidental content modification.
  • Compare hashes to confirm two text strings are identical without viewing raw content.
  • Create deterministic identifiers from variable-length text inputs.

Examples and notes

  • MD5('hello') = 5d41402abc4b2a76b9719d911017c592 — always the same for this input.
  • SHA-256 produces a 64-character hex digest and is commonly used for file integrity.
  • A single character difference in input produces a completely different hash — useful for detecting tampering.

Important note

MD5 and SHA-1 are cryptographically broken and should not be used for security purposes. Use SHA-256 or SHA-512 for any security-sensitive application. This tool hashes text inputs only — binary file hashing requires a dedicated CLI tool.

Frequently Asked Questions

Can I reverse a hash back to the original text?

No. Cryptographic hash functions are one-way. Once text is hashed, the original cannot be retrieved from the hash value.

Is MD5 secure for password storage?

No. MD5 is cryptographically broken and should not be used for security-sensitive purposes. Use SHA-256 or SHA-512 for integrity checks, and use bcrypt or Argon2 for password storage.

What is the difference between SHA-256 and SHA-512?

SHA-512 produces a longer 512-bit (128 hex char) digest vs SHA-256's 256-bit (64 hex char). SHA-512 is computationally heavier but provides stronger collision resistance.

What is a hash collision?

A collision occurs when two different inputs produce the same hash output. MD5 and SHA-1 are vulnerable to engineered collisions. SHA-256 and SHA-512 have no known practical collisions.