Hash Generator
Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes instantly online. Free hash generator using the Web Crypto API — your data never leaves the browser.
Text Input
Related Tools
Unix Timestamp
Convert Unix timestamps to UTC, local time, and ISO 8601 instantly. Auto-detects seconds vs milliseconds.
Base Converter
Convert numbers between decimal, hex, binary, and octal instantly. Free and runs in your browser.
HMAC Generator
Generate HMAC-SHA-256, SHA-384, and SHA-512 signatures instantly. Uses the Web Crypto API — your data never leaves the browser.
Cryptographic hash functions produce a fixed-length digest from arbitrary input data. SHA-2 family functions (SHA-256, SHA-384, SHA-512) were standardized by NIST and are used for data integrity verification, digital signatures, password storage (as part of PBKDF2/bcrypt/scrypt), and certificate fingerprinting. SHA-1, now considered cryptographically broken for signatures, is still used for non-security checksums like Git object IDs.
Hash generation is fundamental to software distribution (verifying downloaded file integrity), version control (Git uses SHA-1 for object addressing), TLS certificates (certificate fingerprints are SHA-256 hashes), code signing, HMAC construction, and deduplication in storage systems like S3 and content-addressable caches.
This tool computes SHA-1, SHA-256, SHA-384, and SHA-512 hashes using the Web Crypto API's SubtleCrypto.digest() method, which runs the computation in the browser's native cryptographic implementation — no JavaScript crypto library required. Input is encoded to UTF-8 bytes via TextEncoder before hashing, and the ArrayBuffer output is converted to lowercase hexadecimal.
Common Use Cases
Verifying downloaded file integrity
Software distribution sites (Linux distributions, Python package mirrors, Apache project downloads) publish SHA-256 checksums alongside download links. After downloading a large file, computing its SHA-256 hash and comparing it against the published checksum confirms the file was not corrupted in transit or tampered with by a supply-chain attack.
Generating content-addressable cache keys
Build systems (Bazel, Pants, Gradle) and CDNs use SHA-256 hashes of file contents as cache keys. When a file's content changes its hash changes, invalidating the cache entry automatically. Computing the hash of a config file, source file, or dependency lockfile lets developers understand what cache keys their build system will generate.
Creating TLS certificate fingerprints
Certificate pinning implementations in mobile apps and security tooling identify certificates by their SHA-256 fingerprint rather than their Subject field or serial number. When configuring certificate pinning in an Android or iOS app, or when auditing a server's TLS certificate using OpenSSL, the SHA-256 fingerprint is the canonical identifier.
Hashing data before storage for deduplication
Object storage systems and backup tools (Restic, Borg, AWS S3 with versioning) identify duplicate content by hashing each chunk or file. Computing a SHA-256 hash of a piece of content before uploading lets a client check whether the server already has that exact content, avoiding redundant transfers in content-addressable storage.
How to Use the Hash Generator
- Type or paste your text in the input area.
- SHA-1, SHA-256, SHA-384, and SHA-512 hashes are generated instantly.
- Click Copy next to any hash to copy it to your clipboard.
- Use Load Example to hash the string "Hello, World!".
About SHA Hash Algorithms
- SHA-1 — 160-bit hash; deprecated for security use, still common in checksums and Git
- SHA-256 — 256-bit hash; widely used in TLS certificates, Bitcoin, and data integrity checks
- SHA-384 — 384-bit hash; stronger variant of SHA-256 for higher security requirements
- SHA-512 — 512-bit hash; maximum strength in the SHA-2 family, used in high-security contexts
Hashes are generated using the browser's built-in Web Crypto API. Your input never leaves your device.