Each algorithm opens in a dedicated page with detailed description
What Is a Hash Function?
A hash function converts any text or file into a unique fixed-length digital fingerprint. Even a single character change produces a completely different result, making it a fundamental tool in information security and data integrity verification.
Available Algorithms
MD5 — 128 bits (32 chars)
Fast and old. Used only for file integrity checks; not recommended for security purposes due to collision vulnerabilities.
SHA-1 — 160 bits (40 chars)
Stronger than MD5 but officially deprecated since 2017 for security applications. Still used by Git and legacy systems.
SHA-256 — 256 bits (64 chars)
The most widely used industry standard in the world. Adopted by TLS/HTTPS, Bitcoin, and digital signature systems.
SHA-384 — 384 bits (96 chars)
More secure than SHA-256 with smaller output than SHA-512. Ideal for TLS 1.2 certificates and government systems.
SHA-512 — 512 bits (128 chars)
The strongest in the SHA-2 family. Used for password hashing and signing official documents.
HMAC-SHA256 — 256 bits (64 chars)
Requires a secret key. Used to verify sender identity in APIs, webhooks, and JWT tokens.
Secure vs Legacy Algorithms
- Secure: SHA-256, SHA-384, SHA-512, HMAC-SHA256 — resistant to modern attacks
- Legacy: MD5 and SHA-1 — no longer use for security purposes
When to Use This Tool?
- Verify integrity of downloaded or transferred files
- Generate digital fingerprints for documents and contracts
- Test and build security applications
- Learn cryptographic algorithms in practice