Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from text
Generators
Tool
How to Use
1Enter the text you want to hash in the text area
2Select the hashing algorithm (SHA-1, SHA-256, SHA-384, or SHA-512)
3Click "Generate Hash" to compute the hash
4Copy the resulting hex hash with the copy button
Frequently Asked Questions
A cryptographic hash function takes an input and produces a fixed-size string of bytes (the hash). The same input always produces the same hash, but even a tiny change in input produces a completely different hash.
SHA-256 is the most widely used and recommended for most purposes. SHA-512 offers higher security. Avoid SHA-1 for security-critical applications as it is considered weak. SHA-384 is a truncated version of SHA-512.
No. All hashing is done locally in your browser using the Web Crypto API. Your input text never leaves your device.
No. Cryptographic hash functions are one-way. It is computationally infeasible to reconstruct the original input from its hash.