Hash Generator

SHA-1, SHA-256, SHA-384, SHA-512. Computed locally via SubtleCrypto — your input never leaves your device.

Hashes

SHA-1 (160 bits)

SHA-256 (256 bits)

SHA-384 (384 bits)

SHA-512 (512 bits)

What hash functions are for

A hash function produces a fixed-size "fingerprint" of arbitrary input. Same input → same hash. Tiny input change → completely different hash. You can't reverse it (one-way function).

Common uses: verifying file integrity (compare hashes), password storage (hashed + salted, never plaintext), Git commits (each is identified by SHA-1), and content addressing (IPFS, container image layers).

Which to use

  • SHA-1 — broken for security since 2017 (SHAttered attack). Still fine for non-security uses like Git. Don't use for new security designs.
  • SHA-256 — the workhorse. Used in TLS, Bitcoin, and most file integrity checks.
  • SHA-384 / SHA-512 — same family, longer output. Slightly more secure margin. SHA-512 is actually faster than SHA-256 on 64-bit hardware.

What's not here

MD5 isn't included — it's been broken since 2004 and the browser's SubtleCrypto API deliberately doesn't expose it, which is the right call.