Generate cryptographic hashes from any text. Uses the Web Crypto API β nothing is sent to a server.
Supported Algorithms
- MD5 β 128-bit hash. Fast but not collision-resistant. Use for checksums, not security.
- SHA-1 β 160-bit hash. Deprecated for security but still used in legacy systems.
- SHA-256 β 256-bit hash. Industry standard for security, certificates, and blockchain.
- SHA-512 β 512-bit hash. Strongest option, used in high-security applications.
Common Use Cases
- Verify file integrity (compare checksums)
- Generate content hashes for caching
- Create deterministic IDs from strings
- Check if two strings are identical without comparing them directly