~/tools/hash-generator
READY
Generate and verify cryptographic hashes. SHA-1, SHA-256, SHA-384, SHA-512, and MD5 — all computed client-side using the Web Crypto API. Your data never leaves your browser.
┤ OUTPUT ├
[INIT] hash-generator v1.0.0 loaded
[INFO] All processing runs in your browser
[INFO] No data is transmitted to any server
algorithm:
0 bytes
◈
Drop a file here or click to select
Any file type — processed entirely in your browser
—
> Results
> About Cryptographic Hashes
What is a hash? A cryptographic hash function takes any input and produces a fixed-size string of characters. The same input always produces the same hash, but even a tiny change in input produces a completely different hash.
SHA-256 is the gold standard — used in Bitcoin, TLS certificates, and file integrity verification. SHA-512 provides a longer hash for additional security.
When to use each:
- SHA-256 — General purpose, file verification, checksums
- SHA-512 — When you need maximum hash length
- SHA-384 — Truncated SHA-512, used in some TLS suites
- SHA-1 — Legacy only, known vulnerabilities
- MD5 — Broken for security, still used for non-security checksums