Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes for text or files. Verify hash integrity and compare hashes.
—————Compare your hash with an expected value to verify file integrity.
Legacy, not cryptographically secure
Deprecated, avoid for security
Recommended for most uses
High security applications
Maximum security
A hash function takes input data of any size and produces a fixed-size output (hash). The same input always produces the same hash, but even a tiny change in input creates a completely different hash.
Generate SHA-256 hash of a downloaded file and compare with the provided checksum to verify the file wasn't corrupted or tampered with.
Hash passwords with SHA-256 or SHA-512 (with salt) before storing in databases. Never store plain text passwords.
Use hashes to identify duplicate files. Files with identical hashes are likely identical, saving storage space.
Hash documents before signing. The hash is encrypted with a private key to create a digital signature that proves authenticity.
For security: SHA-256 or SHA-512. MD5 and SHA-1 are deprecated and should not be used for security purposes. MD5 is still useful for checksums and non-security applications.
No, hash functions are one-way. You cannot reverse a hash to get the original input. This is by design for security purposes.
Text hashing processes the text string directly. File hashing reads the entire file and computes the hash of its binary content. Both produce the same hash for identical content.
Hash functions are deterministic - the same input always produces the same output. This property is essential for file integrity verification and deduplication.
No, MD5 is cryptographically broken and should not be used for security purposes. It's still useful for non-security applications like checksums or data deduplication.
Category:
Developer Tools →Encode text or files to Base64, or decode Base64 back to its original form. Supports URL-safe Base64...
Format, validate, minify, and explore JSON data. Interactive tree view with syntax highlighting and ...
Build and understand cron expressions visually. Schedule tasks with human-readable explanations and ...