Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text or files. Supports HMAC authentication codes.
What Is a Hash Generator?
A hash generator takes an input — text or a file — and produces a fixed-length string of characters called a hash (or digest). Hash functions are one-way: you can compute a hash from data, but you cannot reverse the hash to recover the original data. This property makes hashing essential for password storage, data integrity verification, digital signatures, and checksums.
Common hash algorithms include MD5 (128-bit, fast but cryptographically broken), SHA-1 (160-bit, deprecated for security use), SHA-256 (256-bit, widely used in TLS, Bitcoin, and certificate chains), and SHA-512 (512-bit, highest security margin). Each algorithm produces a different-length output, but the same input always produces the same hash — even a single-byte change produces a completely different result (the "avalanche effect").
This hash generator computes MD5, SHA-1, SHA-256, and SHA-512 hashes simultaneously from text or files. It also supports HMAC (Hash-based Message Authentication Code) for keyed hashing, used in API authentication and message integrity. All computation happens in your browser using the Web Crypto API — your data and keys never leave your machine.
How to Generate Hashes Online
- Choose your input mode — Switch between the "Text" tab for string input or the "File" tab to hash any file.
- Enter or upload your data — Type or paste text into the input field, or drag-and-drop a file onto the upload area.
- Enable HMAC (optional) — Toggle HMAC mode and enter a secret key to generate keyed hashes (HMAC-MD5, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-512).
- View all hashes instantly — MD5, SHA-1, SHA-256, and SHA-512 hashes are computed in real-time as you type or after file upload.
- Copy any hash — Click the copy button next to any hash to copy it to your clipboard.
Key Features
- Four algorithms at once — See MD5, SHA-1, SHA-256, and SHA-512 results simultaneously without switching between tools.
- File hashing — Drag-and-drop or browse to hash any file type. Verify downloads, check integrity, or compare file versions.
- HMAC support — Generate HMAC authentication codes with a secret key for API signatures, webhook verification, and message authentication.
- Real-time computation — Text hashes update instantly as you type, with no button clicks required.
- Web Crypto API — SHA hashes use the browser's native Web Crypto API for maximum performance and security.
- 100% client-side — Your data and secret keys never leave your browser. No server, no uploads, no tracking.
Common Use Cases
- Verifying file downloads — Compare the SHA-256 hash of a downloaded file against the publisher's checksum to ensure it wasn't tampered with.
- API authentication — Generate HMAC-SHA-256 signatures for REST API requests, webhook payloads, and OAuth signatures.
- Password hashing reference — Quickly check what a given password looks like when hashed (though production systems should use bcrypt or Argon2).
- Data integrity checks — Generate checksums for configuration files, database exports, or backups to detect accidental corruption.
- Deduplication — Hash files or content to identify duplicates by comparing their SHA-256 digests.
Frequently Asked Questions
🔒 This tool runs entirely in your browser. No data is sent to any server.