Menu

Hash Generator

Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes instantly.

Last updated

Input11 bytes
InputRuns in your browser
HashesClick any value to copy
  • MD5128-bit
  • SHA-1160-bit
  • SHA-256256-bit
  • SHA-384384-bit
  • SHA-512512-bit

What is a hash generator?

A hash generator computes a *hash* — a short, fixed-length fingerprint of some input. The fingerprint changes drastically with even a single-character difference, so hashes are used to verify file integrity, check whether two values are equal without comparing them in full, build content-addressable systems (Git uses SHA-1/SHA-256), and as building blocks inside larger security protocols.

A good cryptographic hash function has three properties: it is *deterministic* (same input → same hash), *one-way* (you can't recover the input from the hash), and *collision-resistant* (it's infeasible to find two inputs with the same hash). Modern algorithms like SHA-256 and SHA-512 satisfy all three; older algorithms like MD5 and SHA-1 are *broken* and should not be used for security-sensitive comparisons.

Hashing is *not* encryption. Encryption is reversible with a key; hashing is one-way by design. Hashing is also *not* a password storage mechanism — passwords need a *password hash* like bcrypt, scrypt, or Argon2, which deliberately makes brute force expensive.

What you'll learn while generating hashes

  • A hash function maps any input — short or long — to a fixed-length output (e.g., SHA-256 always produces 256 bits = 64 hex characters).
  • Same input always produces the same hash. Even a single-bit change produces a completely different hash (the *avalanche effect*).
  • MD5 and SHA-1 are no longer collision-resistant — fine for non-security checksums, but unsafe for signatures, certificates, or anything trust-related.

How to generate a hash step by step

  1. Paste your input

    Paste any text — a string, a JSON snippet, a license key. The hash updates as you type.

  2. Pick the algorithm

    Choose MD5, SHA-1, SHA-256, SHA-384, or SHA-512. SHA-256 is the safest default for general-purpose checksums.

  3. Read the output

    The hash is shown in lowercase hexadecimal. Toggle uppercase or copy the value to your clipboard.

  4. Compare two hashes if needed

    Paste a known hash (from a download page, a Git commit, a checksum file) and the tool will tell you whether yours matches.

Hash algorithms quick reference

The algorithms you'll see most often, with their output sizes and current security status. SHA-1 is specified in RFC 3174; the SHA-2 family is in NIST FIPS 180-4.

AlgorithmOutput sizeStatus / where you see it
MD5128 bits / 32 hex charsBroken — only OK for non-security checksums
SHA-1160 bits / 40 hex charsBroken — Git history, legacy systems only
SHA-256256 bits / 64 hex charsStandard — TLS, Git modern, blockchain
SHA-384384 bits / 96 hex charsUsed in TLS suites that prefer SHA-2 family
SHA-512512 bits / 128 hex charsStrong — sometimes faster than SHA-256 on 64-bit hardware
bcrypt / scrypt / Argon2varies*Password* hashes — use these for passwords, not SHA-x

Hash examples to try

Same algorithm, tiny input change

Input A

hello world

SHA-256(A)

b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

Input B

Hello world

SHA-256(B)

4ae7c3b6ac0beff671efa8cf57386151c06e58ca53a78d83f36107316cec125f

One capital letter completely changes the hash. That's the *avalanche effect* — the property that makes hashes useful for change detection.

Verify a download checksum

Published checksum
SHA256: 3a7bd3e2360a3d290dd0b1aef6a04e9b… ubuntu.iso
Workflow

Compute SHA-256 of the file you downloaded; compare it to the publisher's value. Match means the file wasn't corrupted in transit or tampered with.

Downloads of OS images, language runtimes, and signed releases routinely publish a SHA-256 next to the file. Always check before installing.

MD5 for non-security deduplication

Input

user@example.com

MD5

b58996c504c5638798eb6b511e6f49af

Gravatar uses MD5(email) as an avatar key. MD5 is OK for that — a non-secret identifier — but never use it where collisions or pre-image attacks would matter.

Common hashing mistakes

  • Storing user passwords with plain SHA-256. Use a password hash (bcrypt, scrypt, Argon2) with a per-user salt and a deliberate cost factor.
  • Trusting MD5 or SHA-1 for security-sensitive comparisons in 2026. Both are broken — collisions are practical to compute.
  • Comparing a hex hash with == after manipulating one of the strings. Trim whitespace and normalize case before comparing.

Hash Generator FAQ

What is a hash function?
A hash function takes input of any length and produces a fixed-length output called a hash. The same input always produces the same hash; even a tiny change in the input produces a completely different hash.
Is MD5 still safe to use?
MD5 is broken for cryptographic purposes — practical collisions are easy to compute. It's still acceptable for non-security checksums (file deduplication, cache keys, Gravatar) but never for signatures, certificates, or password storage.
What is the difference between SHA-256 and SHA-512?
Both are part of the SHA-2 family. SHA-256 produces a 256-bit output; SHA-512 produces a 512-bit output. SHA-512 can actually be faster on 64-bit hardware. SHA-256 is the more common default in protocols today.
How do I hash a password?
Don't use SHA-256 directly. Use a password hash designed for the job — bcrypt, scrypt, or Argon2 — with a per-user salt and a tunable cost factor. They are deliberately slow to make brute-force attacks expensive.
Can I reverse a hash?
No — hash functions are one-way by design. The only way to recover the original is to guess inputs and check whether their hash matches. That's why salting and slow hashing matter for passwords.
Are these hashes generated locally?
Yes. Coddy's hash generator uses the Web Crypto API in your browser. Your input never leaves your machine.

Other developer tools

Learn to code with Coddy

GET STARTED