Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 and SHA-3 hashes from text or files — all algorithms simultaneously. HMAC mode, file drag-and-drop, hash comparison, uppercase toggle. 100% client-side via Web Crypto API — your data never leaves your browser.
Hash Generator Tool
HMAC (Hash-based Message Authentication Code) combines a hash function with a secret key. Use it to verify both the integrity and authenticity of a message — anyone without the key cannot reproduce the HMAC.
Verify a file or text hash against a published checksum. Paste the text or drop a file, enter the expected hash, and the tool shows whether they match.
Rate this tool
All algorithms simultaneously, HMAC, file hashing and hash comparison — features most hash generators skip
Most online hash generators show one algorithm at a time. This tool generates MD5, SHA-1, SHA-256, SHA-384, SHA-512 and SHA-3 simultaneously from a single input, flags deprecated algorithms with security warnings, and adds HMAC, file hashing and hash comparison in the same tool.
How to generate a hash online
Hash algorithm comparison
| Algorithm | Output size | Security status | Common use cases |
|---|---|---|---|
| MD5 | 128-bit (32 hex) | ⚠ Broken (2004) | Non-security checksums, cache keys, legacy systems |
| SHA-1 | 160-bit (40 hex) | ⚠ Deprecated (2017) | Legacy systems, Git commit IDs (internal only) |
| SHA-256 | 256-bit (64 hex) | ✓ Secure | TLS certificates, Bitcoin, code signing, general use |
| SHA-384 | 384-bit (96 hex) | ✓ Secure | High-security certificates, government compliance |
| SHA-512 | 512-bit (128 hex) | ✓ Secure | Maximum security, archive verification, forensics |
| SHA-3-256 | 256-bit (64 hex) | ✓ Secure | Alternative to SHA-2, different construction (Keccak) |
Hash Generator — A Complete Guide to MD5, SHA-256, SHA-512 and HMAC
A cryptographic hash function takes an input of any size — a single character, a paragraph, or a 10GB file — and produces a fixed-size output called a hash, digest or checksum. The hash is deterministic: the same input always produces the same output. But the relationship is one-way: you cannot reconstruct the input from the hash. And it is collision-resistant: it is computationally infeasible to find two different inputs that produce the same hash. These three properties make hashes essential for file integrity verification, digital signatures, password storage and data deduplication.
MD5 SHA-256 hash generator online free
MD5 (Message Digest 5) was designed by Ron Rivest in 1991 and produces a 128-bit hash displayed as 32 hexadecimal characters. It was once the standard for file checksums and password storage. However, in 2004 researchers demonstrated that MD5 collisions — two different inputs producing the same hash — could be computed on ordinary hardware in minutes. MD5 should never be used for security-sensitive purposes. SHA-256 is part of the SHA-2 family, designed by the NSA and standardised by NIST. It produces a 256-bit hash (64 hex characters) and is currently considered secure. SHA-256 is used in TLS certificates, Bitcoin proof of work, code signing and most modern security applications.
File hash generator for verification
When you download software, the publisher typically publishes a SHA-256 or MD5 checksum alongside the download. After downloading the file, you compute its hash and compare it to the published value. If they match, the file is intact — it was not corrupted during download and was not tampered with in transit. This is critical for security software, operating system installers, and any file where integrity matters. File hashing works by reading the file in chunks (to avoid loading large files entirely into memory) and feeding each chunk through the hash algorithm sequentially.
HMAC generator online free
HMAC (Hash-based Message Authentication Code) is a construction that combines a hash function with a secret key. HMAC-SHA-256 is computed as: HMAC = Hash(key XOR opad ‖ Hash(key XOR ipad ‖ message)). The critical property is that only someone who knows the secret key can produce or verify the HMAC. This makes it suitable for webhook signature verification (GitHub, Stripe and most webhook APIs use HMAC-SHA-256 to sign payloads), API authentication tokens, and verifying that a message has not been tampered with in transit. Unlike a bare hash, an HMAC cannot be forged without the key even if the attacker knows the algorithm.
SHA-512 generator online
SHA-512 is part of the SHA-2 family and produces a 512-bit hash (128 hex characters). It is more secure than SHA-256 by virtue of its longer output, but importantly: on 64-bit systems, SHA-512 is often faster than SHA-256 because its internal operations are designed around 64-bit words. For most applications, SHA-256 is sufficient. Choose SHA-512 when you need maximum security, when working with high-value archives, forensic data, or government and compliance contexts that mandate 512-bit hashes.
Checksum verifier free tool
A checksum is any value computed from data that allows you to verify the data’s integrity. In common usage it refers to a cryptographic hash — specifically SHA-256 or MD5 — published alongside a file download. Verifying a checksum involves: (1) downloading the file, (2) computing the hash of the downloaded file, (3) comparing your computed hash to the published checksum. If they match exactly, the file is authentic. The Compare tab of this tool automates step 3: paste your text and the expected hash and it shows match or mismatch instantly, auto-detecting the algorithm from the hash length.