Hash Generator
SHA-1, SHA-256, SHA-384, SHA-512. Computed locally via SubtleCrypto — your input never leaves your device.
Hashes
SHA-1 (160 bits)
—
SHA-256 (256 bits)
—
SHA-384 (384 bits)
—
SHA-512 (512 bits)
—
What hash functions are for
A hash function produces a fixed-size "fingerprint" of arbitrary input. Same input → same hash. Tiny input change → completely different hash. You can't reverse it (one-way function).
Common uses: verifying file integrity (compare hashes), password storage (hashed + salted, never plaintext), Git commits (each is identified by SHA-1), and content addressing (IPFS, container image layers).
Which to use
- SHA-1 — broken for security since 2017 (SHAttered attack). Still fine for non-security uses like Git. Don't use for new security designs.
- SHA-256 — the workhorse. Used in TLS, Bitcoin, and most file integrity checks.
- SHA-384 / SHA-512 — same family, longer output. Slightly more secure margin. SHA-512 is actually faster than SHA-256 on 64-bit hardware.
What's not here
MD5 isn't included — it's been broken since 2004 and the browser's SubtleCrypto API deliberately doesn't expose it, which is the right call.