Tool
Enter text and get MD5, SHA-1, SHA-256, and SHA-512 hashes in one click.
A hash function takes any input and produces a fixed-length "fingerprint." The same input always gives the same hash, but you can't reverse-engineer the original from the hash. Common uses: verifying file integrity (compare hashes after a download), storing passwords (databases keep hashes, not plaintext), and deduplication.
| Algorithm | Output Length | Security |
|---|---|---|
| MD5 | 128 bit (32 hex) | Broken — checksums only |
| SHA-1 | 160 bit (40 hex) | Deprecated for security |
| SHA-256 | 256 bit (64 hex) | Current standard |
| SHA-512 | 512 bit (128 hex) | Strongest, high-security use |