Hash Calculator

Generate cryptographic hashes for text using MD5, SHA-1, SHA-256, and SHA-512

Hash Generation
Enter text and select a hash algorithm

All hash calculations are performed locally in your browser for privacy and security.

Hash Results
Generated hashes and analysis

Enter text to generate cryptographic hashes

Test Examples & Verification
Click to load test examples. Use known test vectors to verify hash accuracy.

Quick Test Examples:

Test Vector: "hello"

hello

Known test vector for verification

Test Vector: Empty String

(empty string)

Hash of empty string

Simple Text

Hello, World!

Common greeting text

Password Example

MySecurePassword123!

Example password (never hash real passwords without salt!)

Email Address

user@example.com

Email address format

JSON Data

{"name":"John","age":30,"city":"New York"}

Structured JSON data

Known Test Vector - "hello":

MD5:
5d41402abc4b2a76b9719d911017c592
SHA-1:
aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
SHA-256:
2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
SHA-512:
9b71d224bd62f3785d96d46ad3ea3d73319bfbc2890caadae2dff72519673ca72323c3d99ba5c11d7c7acc6e14b8c5da0c4663475c2e5c3adef46f73bcdec043

Use these values to verify that the hash calculator is working correctly.

Hash Use Cases
Common applications of cryptographic hashing

Password Storage

Hash passwords before storing in databases. Never store plain text passwords.

Recommended: SHA-256 or SHA-512 with salt

Data Integrity

Verify that data hasn't been corrupted during transmission or storage.

Recommended: SHA-256 or SHA-512

Digital Signatures

Create unique fingerprints for documents and files.

Recommended: SHA-256 or SHA-512

Blockchain

Secure and verify transactions in blockchain networks.

Recommended: SHA-256 (Bitcoin) or SHA-3
Hash Algorithm Security

⚠️ Deprecated Algorithms

MD5

Cryptographically broken. Vulnerable to collision attacks. Only use for non-security purposes like checksums.

SHA-1

Deprecated by NIST. Vulnerable to collision attacks. Should not be used for new applications.

✅ Recommended Algorithms

SHA-256

Part of SHA-2 family. Widely used and considered secure. Good balance of security and performance.

SHA-512

Stronger variant of SHA-2. Higher security margin. Recommended for high-security applications.