Generate cryptographic hashes — MD5, SHA-1, SHA-256, SHA-512, and more
128-bit hash, 32 hex characters. Not cryptographically secure - use for checksums only.
160-bit hash, 40 hex characters. Deprecated - vulnerable to collision attacks.
256-bit hash, 64 hex characters. Recommended - secure for most applications.
512-bit hash, 128 hex characters. Very secure - for high-security applications.
Keccak algorithm, 256-bit output. Latest standard - modern alternative.
Keyed-Hash Message Authentication Code. Authenticated hash - requires secret key.
Generate secure cryptographic hashes using MD5, SHA-1, SHA-256, SHA-512, SHA-3, RIPEMD-160, and HMAC algorithms. Perfect for password hashing, file integrity verification, digital signatures, and API authentication. All processing happens locally in your browser — 100% private and secure.