Hash Generator

Generate MD5, SHA-1, SHA-256 and SHA-512 hashes from text or files.

Hash Comparison

Frequently Asked Questions

What is a cryptographic hash function?

A hash function takes any input and produces a fixed-length output string (the hash/digest). Properties: deterministic (same input always gives same output), one-way (you cannot reverse a hash to get the original), and avalanche effect (a tiny input change produces a completely different hash). These properties make hashes useful for data integrity verification and password storage.

Which hash algorithm should I use?

SHA-256 is the modern standard for most applications. MD5 and SHA-1 are cryptographically broken (collision attacks exist) — avoid for security purposes but still useful for non-security checksums and file verification. SHA-512 provides the highest security margin. For passwords, use bcrypt, Argon2, or scrypt (purpose-built password hashing functions).

What is HMAC and how does it differ from a plain hash?

HMAC (Hash-based Message Authentication Code) mixes a secret key with the message before hashing, creating a signature that only someone with the secret key can verify. Plain hashing is one-way but anyone can hash the same input. HMAC is used for API authentication, JWT signatures, and verifying that data wasn't tampered with in transit.

How do I verify a file checksum?

Hash the downloaded file with this tool (drag & drop) and compare the output to the checksum provided on the download page. If they match, the file is authentic and unmodified. If they differ, the file was corrupted or tampered with. SHA-256 checksums are the standard for software distribution.