A cryptographic hash function takes any amount of input data and produces a fixed-length fingerprint (the hash or digest). The same input always produces the same hash, but even a one-character change produces a completely different result. Hashes are one-way — you can't reconstruct the input from the output.
Common uses: verifying file downloads match their published checksum, storing passwords safely, signing API requests, and integrity checks in build pipelines.
faq
Does this hash tool send my data to a server?
No. Hashing runs entirely in your browser using the native Web Crypto API (crypto.subtle.digest). Nothing you type or upload is transmitted anywhere.
What is SHA-256 used for?
SHA-256 is used to verify file integrity (checksums), store passwords securely, sign TLS certificates, and authenticate messages in HMAC schemes. It produces a 256-bit / 64-character hex digest.
What is the difference between SHA-256 and SHA-512?
SHA-256 produces a 64-character hex digest. SHA-512 produces a 128-character digest with a larger security margin. SHA-512 is faster on 64-bit CPUs for large inputs. For most applications SHA-256 is sufficient.
Why is MD5 not listed?
MD5 is cryptographically broken — collisions have been practical since 2004, meaning two different inputs can produce the same hash. It's also not available in the browser-native Web Crypto API. Use SHA-256 or higher for any security purpose.
Can I hash a file with this tool?
Yes. Drag a file onto the drop zone or click to select one. The tool reads the file as binary and produces the same hash you'd get from sha256sum filename or openssl dgst -sha256 filename on the command line.
What does the verify field do?
Paste any known hash into the Verify field. The tool compares it against all four computed hashes and shows a green match or red mismatch instantly. Useful for checking file checksums against published values.