We use cookies to improve your experience. Learn more

CalcHub
Science

Hash Calculator

Generate MD5, SHA-1, SHA-256, and SHA-512 hash values.

🔐

Hash Calculator

Results

Formula & Methodology

MD5: 128-bit hash (32 hex chars) — deprecated for security
SHA-1: 160-bit hash (40 hex chars) — deprecated for security
SHA-256: 256-bit hash (64 hex chars) — widely used
SHA-512: 512-bit hash (128 hex chars) — strongest here

Hash functions are one-way — you cannot reverse a hash.

About Hash Calculator

Our hash calculator generates cryptographic hash values for any text using MD5, SHA-1, SHA-256, and SHA-512 algorithms. Hash functions are used for data integrity verification, digital signatures, and password storage.

Frequently Asked Questions

A hash function converts input data of any size into a fixed-size output (hash/digest). The same input always produces the same hash. It's a one-way function — you cannot reverse-engineer the original data from the hash.
MD5 produces a 128-bit hash (32 hex chars) — fast but cryptographically broken, still used for checksums. SHA-1 produces 160-bit hash (40 chars) — also broken cryptographically. SHA-256 (256-bit, 64 chars) is currently secure and widely recommended.
Not for security-sensitive applications. MD5 and SHA-1 are vulnerable to collision attacks (two different inputs producing the same hash). Don't use them for password hashing or digital signatures. They're acceptable for non-security checksums (file integrity verification).
A collision occurs when two different inputs produce the same hash output. For MD5 and SHA-1, collisions can be deliberately engineered by attackers, compromising security. SHA-256 and SHA-3 have no known practical collisions.
Passwords should be stored as hashes, never plaintext. When you log in, your entered password is hashed and compared to the stored hash. For passwords, use slow adaptive hashing algorithms like bcrypt, scrypt, or Argon2 — not MD5/SHA256.
A salt is a random value added to the input before hashing. It prevents identical passwords from having identical hashes and defeats precomputed rainbow table attacks. Each user should have a unique, random salt stored alongside their hashed password.
Download the file and its published checksum (e.g., SHA-256). Hash the downloaded file and compare to the published hash. If they match, the file wasn't corrupted or tampered with during download. Linux/macOS: `sha256sum filename`.

Found this useful? Share it!

Related Calculators