Generate various cryptographic hashes for text or files.
Choose input type, provide data, and configure hashing options.
0 characters
• Cryptographic hash functions produce a fixed-size string (hash) from input data.
• SHA-256 and above are generally recommended for new applications.
• MD5 and SHA-1 are considered insecure for many purposes due to collision vulnerabilities.
• HMAC combines a hash function with a secret key for message authentication.
• All hashing is performed locally in your browser. No data is sent to any server.
Your data never leaves your browser. All hashing is done locally.
Supports MD5 (info only), SHA-1, SHA-256, SHA-384, and SHA-512.
Generate keyed hashes (HMAC) for enhanced message integrity and authentication.