Skip to main content

Hash Generator — MD5, SHA-256, SHA-512 & HMAC Online

Create cryptographic hash values with our versatile Hash Generator. The tool supports all common hash algorithms: MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Generate hashes from text or files, create HMAC signatures with custom keys, and generate Subresource Integrity (SRI) hashes for secure CDN integration. Live mode enables real-time hashing during input, and the hash comparison feature helps verify file integrity.

W3C SRI Web Crypto API Client-Side Only

Features

  • Multiple hash algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512
  • Hash text and files
  • Compare hashes for verification
  • HMAC support with custom keys
  • Uppercase and lowercase output options
  • Copy hashes with one click
  • Real-time hash generation
  • 100% client-side processing - your data never leaves your browser

Common Use Cases

  • File Integrity Verification: Verify downloads haven't been tampered with
  • Password Hashing: Store secure password hashes (use SHA-256 or higher)
  • Data Deduplication: Identify duplicate files or content
  • Checksum Generation: Create checksums for data validation
  • Digital Signatures: Component of cryptographic signature systems
  • API Authentication: Generate HMAC signatures for API requests

Hash Algorithm Selection

  • MD5: Fast but not recommended for security (128-bit, vulnerable to collisions)
  • SHA-1: Deprecated for security use (160-bit, collision attacks exist)
  • SHA-256: Industry standard for security applications (256-bit, secure)
  • SHA-384: High security variant (384-bit, very secure)
  • SHA-512: Maximum security variant (512-bit, very secure)

Useful Resources

NIST Cryptographic Hash Functions Official NIST documentation and standards for hash algorithms
Secure Hash Algorithms (SHA) - Wikipedia Comprehensive overview of SHA family algorithms and their security
MDN SubtleCrypto.digest() Browser API documentation for generating cryptographic digests
OWASP Password Storage Cheat Sheet Security best practices for password hashing and storage