Science
Hash Calculator
Generate MD5, SHA-1, SHA-256, and SHA-512 hash values.
🔐
Hash Calculator
Results
Formula & Methodology
MD5: 128-bit hash (32 hex chars) — deprecated for security
SHA-1: 160-bit hash (40 hex chars) — deprecated for security
SHA-256: 256-bit hash (64 hex chars) — widely used
SHA-512: 512-bit hash (128 hex chars) — strongest here
Hash functions are one-way — you cannot reverse a hash.
SHA-1: 160-bit hash (40 hex chars) — deprecated for security
SHA-256: 256-bit hash (64 hex chars) — widely used
SHA-512: 512-bit hash (128 hex chars) — strongest here
Hash functions are one-way — you cannot reverse a hash.
About Hash Calculator
Our hash calculator generates cryptographic hash values for any text using MD5, SHA-1, SHA-256, and SHA-512 algorithms. Hash functions are used for data integrity verification, digital signatures, and password storage.
Frequently Asked Questions
A hash function converts input data of any size into a fixed-size output (hash/digest). The same input always produces the same hash. It's a one-way function — you cannot reverse-engineer the original data from the hash.
MD5 produces a 128-bit hash (32 hex chars) — fast but cryptographically broken, still used for checksums. SHA-1 produces 160-bit hash (40 chars) — also broken cryptographically. SHA-256 (256-bit, 64 chars) is currently secure and widely recommended.
Not for security-sensitive applications. MD5 and SHA-1 are vulnerable to collision attacks (two different inputs producing the same hash). Don't use them for password hashing or digital signatures. They're acceptable for non-security checksums (file integrity verification).
A collision occurs when two different inputs produce the same hash output. For MD5 and SHA-1, collisions can be deliberately engineered by attackers, compromising security. SHA-256 and SHA-3 have no known practical collisions.
Passwords should be stored as hashes, never plaintext. When you log in, your entered password is hashed and compared to the stored hash. For passwords, use slow adaptive hashing algorithms like bcrypt, scrypt, or Argon2 — not MD5/SHA256.
A salt is a random value added to the input before hashing. It prevents identical passwords from having identical hashes and defeats precomputed rainbow table attacks. Each user should have a unique, random salt stored alongside their hashed password.
Download the file and its published checksum (e.g., SHA-256). Hash the downloaded file and compare to the published hash. If they match, the file wasn't corrupted or tampered with during download. Linux/macOS: `sha256sum filename`.
Related Calculators
🌡️
Science
Temperature Converter
Convert between Celsius, Fahrenheit, Kelvin, and Rankine.
🧪
Science
pH Calculator
Calculate pH, pOH, and classify acid/base strength.
⚗️
Science
Molecular Weight Calculator
Find molecular weight from any chemical formula.
💻
Science
Binary Hex Converter
Convert numbers between binary, octal, decimal, and hexadecimal.
🔭
Science
Scientific Notation Converter
Convert between standard and scientific notation instantly.