Generate SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text. Uses the Web Crypto API for cryptographically accurate results with one-click copy.
What Is a Hash Function?
A cryptographic hash function takes an input of any size and produces a fixed-size string of characters. The same input always produces the same hash, but even a tiny change produces a completely different hash. Hash functions are one-way.
SHA Hash Algorithms Explained
SHA-1 produces a 160-bit hash and is deprecated for security. SHA-256 produces a 256-bit hash and is widely used in TLS, Bitcoin, and file verification. SHA-384 and SHA-512 produce longer hashes for extra security.
Common Uses for Hash Functions
Hashes are used for password storage, data integrity verification, digital signatures, blockchain technology, and deduplication.
SHA-256 is recommended for general use. SHA-1 is deprecated for security applications. Use SHA-512 for extra security margin.
Can a hash be reversed?
No. Cryptographic hash functions are one-way. Common short inputs can be found via rainbow tables, which is why passwords should be salted.
Why are there different hash lengths?
SHA-1 is 40 hex chars, SHA-256 is 64, SHA-384 is 96, SHA-512 is 128. Longer hashes reduce collision probability.
Is SHA-1 still safe to use?
SHA-1 is broken for collision resistance and should not be used for security-critical applications. It is still acceptable for non-security purposes like checksums.
Is my text sent to a server?
No. All hashing is performed entirely in your browser using the Web Crypto API. Your text never leaves your device.