🍋 Privacy & Security
Hash Generator
Generate SHA and other cryptographic hashes
chars
words
sentences
lines
Hash Options
Results
Result
About Hash Generator
Compute cryptographic hash digests of any text using SHA-1, SHA-256, SHA-384, or SHA-512. Output in hex or Base64 format.
How It Works
Uses the Web Crypto API (crypto.subtle.digest) to compute hash digests. Your text is encoded to UTF-8 bytes, hashed with the selected algorithm, then formatted as hexadecimal or Base64.
Step by Step
- 1 Enter or paste text to hash
- 2 Select the hash algorithm (SHA-256 recommended)
- 3 Choose output format: hex or Base64
- 4 Click Hash to generate the digest
- 5 Copy the hash value
Tips
- SHA-256 is the most widely used for integrity verification
- SHA-1 is deprecated for security but still used for checksums
- The same input always produces the same hash (deterministic)
- Even a single character change produces a completely different hash
Frequently Asked Questions
What is a cryptographic hash?
A hash is a fixed-length fingerprint of data. It is a one-way function — you cannot reverse a hash to recover the original input.
Which algorithm should I use?
SHA-256 for most purposes. SHA-512 for maximum security. SHA-1 only for legacy compatibility (it has known weaknesses).