Hash Generator
Generate cryptographic hashes from text or files. Supports HMAC. Everything runs in your browser.
Tips
SHA-256 Is the Standard Choice
SHA-256 is the most widely used secure hash algorithm today. It is used in TLS certificates, Git commits, Bitcoin, and most modern security protocols.
MD5 and SHA-1 Are Broken for Security
Collision attacks have been demonstrated for both MD5 and SHA-1. They should not be used for digital signatures or certificates. However, they remain useful for non-security checksums and legacy system compatibility.
HMAC Adds Authentication to Hashing
HMAC combines a secret key with a hash function, producing a signature that proves both integrity and authenticity. It is essential for webhook verification and API request signing.
File Hashes Verify Download Integrity
Software distributors publish SHA-256 checksums alongside downloads. By hashing the downloaded file locally and comparing, you can confirm the file has not been corrupted or tampered with.
Common Use Cases
Verify File Integrity
Hash downloaded files and compare against published checksums to ensure they have not been corrupted or tampered with.
Webhook Signature Verification
Use HMAC to verify that incoming webhooks are authentic and have not been modified in transit.
Data Deduplication
Generate hashes of file contents to efficiently detect duplicates without comparing entire files.
Password Hashing Reference
Understand hash output formats when working with authentication systems. Note: use bcrypt or Argon2 for actual password storage, not raw SHA.
Git Commit Identification
Git uses SHA-1 (migrating to SHA-256) to identify commits, trees, and blobs. Understanding hashing helps with Git internals.
Digital Forensics
Create cryptographic fingerprints of evidence files to prove they have not been altered since collection.