Hash
What is a cryptographic hash?
A cryptographic hash function takes an input of any size and produces a fixed-length digest. The same input always produces the same output, but even a single-character change produces a completely different hash. Hashes are one-way — you cannot reverse a hash to recover the original input.
Supported algorithms
MD5— 128-bit digest, fast but considered insecure for cryptographic purposesSHA-1— 160-bit digest, deprecated for security but still used for checksumsSHA-256— 256-bit digest, part of the SHA-2 family, widely used and recommendedSHA-384— 384-bit truncated variant of SHA-512SHA-512— 512-bit digest, strongest option in the SHA-2 family
How to use this tool
- Type or paste text to compute all hash algorithms at once
- Drop or select a file to compute its hash digests
- Copy any hash value with one click
Common use cases
- Verifying file integrity after downloads using
SHA-256checksums - Computing content hashes for cache busting or deduplication
- Checking
Subresource Integrity(SRI) hashes for CDN scripts - Comparing hashes to detect file tampering