Generate cryptographic hashes using MD5, SHA-1, SHA-256, SHA-512, and SHA3 algorithms. Hash text or files, compare hashes, and generate HMACs. All processing happens locally in your browser.
Select Text Hash for text input, File Hash for files, Compare to check if two hashes match, or HMAC to generate keyed hashes.
Choose your hash algorithm. SHA-256 is recommended for most uses. Use SHA-512 for extra security or MD5 for legacy compatibility.
Type or paste text, select a file, paste hashes to compare, or enter a message and secret key for HMAC.
Click the generate button to create your hash. Copy the result to clipboard for use elsewhere.
Choose from MD5 (128-bit), SHA-1 (160-bit), SHA-256 (256-bit), SHA-512 (512-bit), SHA3-256 (256-bit), or SHA3-512 (512-bit). Each algorithm produces a fixed-size output regardless of input size.
Your text is converted to bytes using UTF-8 encoding, then processed through the selected hash algorithm. The output is displayed as a hexadecimal string representing the hash value.
Files are read as binary data directly in your browser and processed through the hash algorithm. Even large files can be hashed without being uploaded anywhere.
HMAC combines your message with a secret key using the selected hash algorithm. The key is processed with inner and outer padding before being combined with the message hash.
Hash comparison is case-insensitive and compares the full string. Both hashes must match exactly (after lowercasing) for a positive result.
A cryptographic hash is a fixed-size string generated from input data using a mathematical algorithm. The same input always produces the same hash, but it's computationally infeasible to reverse the hash or find two different inputs that produce the same hash.
Saved Presets is a Supporter feature.
Tool History is a Supporter feature.
Tool Notes is a Supporter feature.