NetCalc
Dark mode
NC
Click generate to compute hash

How to use the hash generator

  1. Paste any text into the textarea and click Hash All.
  2. The tool returns SHA-1, SHA-256 and SHA-512 digests, computed locally via the Web Crypto API.
  3. Switch to the Verify tab to compare against a known hash.

Frequently asked questions

Is SHA-256 still safe to use in 2026?

Yes for integrity and digital signatures. No serious collision or pre-image attacks exist. Pair it with HMAC for authenticated integrity.

Why is MD5 considered broken?

MD5 has demonstrated practical collision attacks since 2004 and pre-image attacks have weakened. Use only for non-security checksums; never for signing or password storage.

What is the difference between hashing and encryption?

Hashing goes one direction only. You can't reverse the digest back to what went in. Encryption works both ways — you need a key to lock it, and the same (or matching) key to unlock it. Use hashes when you care about integrity. Use encryption when you need confidentiality.

How do I verify a downloaded file's hash?

Compute the file's SHA-256 with the OS tool (sha256sum on Linux, Get-FileHash on Windows) and compare byte-for-byte against the published digest from the vendor.