How to use the hash generator
- Paste any text into the textarea and click Hash All.
- The tool returns SHA-1, SHA-256 and SHA-512 digests, computed locally via the Web Crypto API.
- Switch to the Verify tab to compare against a known hash.
Generate cryptographic hash values for text strings using SHA-1, SHA-256, SHA-384, SHA-512, or HMAC with a secret key.
Yes for integrity and digital signatures. No serious collision or pre-image attacks exist. Pair it with HMAC for authenticated integrity.
MD5 has demonstrated practical collision attacks since 2004 and pre-image attacks have weakened. Use only for non-security checksums; never for signing or password storage.
Hashing goes one direction only. You can't reverse the digest back to what went in. Encryption works both ways — you need a key to lock it, and the same (or matching) key to unlock it. Use hashes when you care about integrity. Use encryption when you need confidentiality.
Compute the file's SHA-256 with the OS tool (sha256sum on Linux, Get-FileHash on Windows) and compare byte-for-byte against the published digest from the vendor.