How to use the hash generator
- Paste any text into the textarea and click Hash All.
- The tool returns SHA-1, SHA-256 and SHA-512 digests, computed locally via the Web Crypto API.
- Switch to the Verify tab to compare against a known hash.
Generate cryptographic hash values for text strings using SHA-1, SHA-256, SHA-384, SHA-512, or HMAC with a secret key.
Yes for integrity and digital signatures. No serious collision or pre-image attacks exist. Pair it with HMAC for authenticated integrity.
MD5 has demonstrated practical collision attacks since 2004 and pre-image attacks have weakened. Use only for non-security checksums; never for signing or password storage.
Hashing is one-way: you cannot reverse the digest back to the input. Encryption is two-way with a key. Hashes are for integrity; encryption is for confidentiality.
Compute the file's SHA-256 with the OS tool (sha256sum on Linux, Get-FileHash on Windows) and compare byte-for-byte against the published digest from the vendor.