Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes instantly.
Last updated
Input11 bytes
InputRuns in your browser
HashesClick any value to copy
MD5128-bit
—
SHA-1160-bit
—
SHA-256256-bit
—
SHA-384384-bit
—
SHA-512512-bit
—
What is a hash generator?
A hash generator computes a *hash* — a short, fixed-length fingerprint of some input. The fingerprint changes drastically with even a single-character difference, so hashes are used to verify file integrity, check whether two values are equal without comparing them in full, build content-addressable systems (Git uses SHA-1/SHA-256), and as building blocks inside larger security protocols.
A good cryptographic hash function has three properties: it is *deterministic* (same input → same hash), *one-way* (you can't recover the input from the hash), and *collision-resistant* (it's infeasible to find two inputs with the same hash). Modern algorithms like SHA-256 and SHA-512 satisfy all three; older algorithms like MD5 and SHA-1 are *broken* and should not be used for security-sensitive comparisons.
Hashing is *not* encryption. Encryption is reversible with a key; hashing is one-way by design. Hashing is also *not* a password storage mechanism — passwords need a *password hash* like bcrypt, scrypt, or Argon2, which deliberately makes brute force expensive.
What you'll learn while generating hashes
A hash function maps any input — short or long — to a fixed-length output (e.g., SHA-256 always produces 256 bits = 64 hex characters).
Same input always produces the same hash. Even a single-bit change produces a completely different hash (the *avalanche effect*).
MD5 and SHA-1 are no longer collision-resistant — fine for non-security checksums, but unsafe for signatures, certificates, or anything trust-related.
How to generate a hash step by step
1
Paste your input
Paste any text — a string, a JSON snippet, a license key. The hash updates as you type.
2
Pick the algorithm
Choose MD5, SHA-1, SHA-256, SHA-384, or SHA-512. SHA-256 is the safest default for general-purpose checksums.
3
Read the output
The hash is shown in lowercase hexadecimal. Toggle uppercase or copy the value to your clipboard.
4
Compare two hashes if needed
Paste a known hash (from a download page, a Git commit, a checksum file) and the tool will tell you whether yours matches.
Hash algorithms quick reference
The algorithms you'll see most often, with their output sizes and current security status. SHA-1 is specified in RFC 3174; the SHA-2 family is in NIST FIPS 180-4.
Algorithm
Output size
Status / where you see it
MD5
128 bits / 32 hex chars
Broken — only OK for non-security checksums
SHA-1
160 bits / 40 hex chars
Broken — Git history, legacy systems only
SHA-256
256 bits / 64 hex chars
Standard — TLS, Git modern, blockchain
SHA-384
384 bits / 96 hex chars
Used in TLS suites that prefer SHA-2 family
SHA-512
512 bits / 128 hex chars
Strong — sometimes faster than SHA-256 on 64-bit hardware
bcrypt / scrypt / Argon2
varies
*Password* hashes — use these for passwords, not SHA-x
Compute SHA-256 of the file you downloaded; compare it to the publisher's value. Match means the file wasn't corrupted in transit or tampered with.
Downloads of OS images, language runtimes, and signed releases routinely publish a SHA-256 next to the file. Always check before installing.
MD5 for non-security deduplication
Input
user@example.com
MD5
b58996c504c5638798eb6b511e6f49af
Gravatar uses MD5(email) as an avatar key. MD5 is OK for that — a non-secret identifier — but never use it where collisions or pre-image attacks would matter.
Common hashing mistakes
Storing user passwords with plain SHA-256. Use a password hash (bcrypt, scrypt, Argon2) with a per-user salt and a deliberate cost factor.
Trusting MD5 or SHA-1 for security-sensitive comparisons in 2026. Both are broken — collisions are practical to compute.
Comparing a hex hash with == after manipulating one of the strings. Trim whitespace and normalize case before comparing.
Hash Generator FAQ
What is a hash function?
A hash function takes input of any length and produces a fixed-length output called a hash. The same input always produces the same hash; even a tiny change in the input produces a completely different hash.
Is MD5 still safe to use?
MD5 is broken for cryptographic purposes — practical collisions are easy to compute. It's still acceptable for non-security checksums (file deduplication, cache keys, Gravatar) but never for signatures, certificates, or password storage.
What is the difference between SHA-256 and SHA-512?
Both are part of the SHA-2 family. SHA-256 produces a 256-bit output; SHA-512 produces a 512-bit output. SHA-512 can actually be faster on 64-bit hardware. SHA-256 is the more common default in protocols today.
How do I hash a password?
Don't use SHA-256 directly. Use a password hash designed for the job — bcrypt, scrypt, or Argon2 — with a per-user salt and a tunable cost factor. They are deliberately slow to make brute-force attacks expensive.
Can I reverse a hash?
No — hash functions are one-way by design. The only way to recover the original is to guess inputs and check whether their hash matches. That's why salting and slow hashing matter for passwords.
Are these hashes generated locally?
Yes. Coddy's hash generator uses the Web Crypto API in your browser. Your input never leaves your machine.