Hash Calculator
hash
Generate cryptographic hashes from text or files. All processing runs locally in your browser—your data never leaves your device.
MD5
128-bit hash. Legacy use for file integrity. Not recommended for security.
Generate MD5 hash →SHA-1
160-bit hash. Widely used for checksums. Deprecated for security.
Generate SHA-1 hash →SHA-224
224-bit hash. Truncated SHA-256. Used in TLS, DNSSEC.
Generate SHA-224 hash →SHA-256
256-bit hash. Industry standard for data integrity and cryptography.
Generate SHA-256 hash →SHA-384
384-bit hash. Truncated SHA-512. Good balance of security and output size.
Generate SHA-384 hash →SHA-512
512-bit hash. Maximum security. Used in TLS, digital signatures.
Generate SHA-512 hash →SHA-3
Next-gen Keccak. SHA3-224, 256, 384, 512. NIST standard.
Generate SHA-3 hash →Keccak-256
Original Keccak (not SHA3). Used in Ethereum, Web3, smart contracts.
Generate Keccak-256 hash →CRC32
32-bit checksum. Non-cryptographic. Used in ZIP, PNG, Git.
Generate CRC32 hash →Adler-32
32-bit checksum. Non-cryptographic. Used in zlib, PNG. Faster than CRC32.
Generate Adler-32 hash →xxHash
Extremely fast non-cryptographic hash. xxHash32, xxHash64. Used for deduplication.
Generate xxHash hash →BLAKE2
Fast cryptographic hash. BLAKE2b (256/512-bit), BLAKE2s (256-bit). RFC 7693.
Generate BLAKE2 hash →RIPEMD-160
160-bit European standard. Used in Bitcoin addresses.
Generate RIPEMD-160 hash →Bcrypt
Password hashing with salt. Slow by design. Recommended for passwords.
Generate Bcrypt hash →Argon2
Winner of Password Hashing Competition. Argon2id/2i/2d. Memory-hard, resistant to GPU attacks.
Generate Argon2 hash →PBKDF2
Key derivation from password. RFC 2898. Used in TLS, WPA2, Django, many frameworks.
Generate PBKDF2 hash →Scrypt
Memory-hard key derivation. RFC 7914. Used in many cryptocurrencies, Unix passwords.
Generate Scrypt hash →Whirlpool
512-bit hash. ISO/IEC 10118-3. Used in digital signatures, some cryptocurrencies.
Generate Whirlpool hash →FNV-1a
Fast non-cryptographic hash. 32–1024 bit. URLs, hostnames, checksums.
Generate FNV-1a hash →1. How to Use
- Choose an algorithm from the grid above (e.g., MD5, SHA-256, Bcrypt). Each link opens a dedicated calculator for that algorithm.
- For general hashing (MD5, SHA-1, SHA-256, etc.): Enter text in the input box or drag-and-drop a file. Click the generate button.
- For password hashing (Bcrypt, Argon2, PBKDF2, Scrypt): Enter your password, configure parameters (rounds, memory, iterations), and generate. Use Verify to test passwords.
- For checksums (CRC32, Adler-32, xxHash, FNV-1a): Enter text or upload a file. These are non-cryptographic—use for integrity, not security.
- Use the Verify section on each algorithm page to compare a hash against new input or test a password against a stored hash.
- Copy results with one click. Store hashes and parameters (salt, iterations) for password algorithms—you need them for verification.
- File support: Most algorithms accept file upload. Password hashers typically use text input only.
2. How It Works
Hash functions map arbitrary-length input to fixed-length output. Cryptographic hashes (SHA-256, BLAKE2, etc.) are designed so that finding two inputs with the same hash (collision) or reversing the hash (preimage) is computationally infeasible.
Merkle–Damgård hashes (MD5, SHA-1, SHA-256): Input is padded and split into blocks. Each block is mixed with an internal state via a compression function. Final state is the hash. Formula: H_i = f(H_{i-1}, M_i); output = H_n.
Sponge hashes (SHA-3, Keccak): Absorb input into a large state, then squeeze output. Resistant to length-extension attacks. Password hashes (Bcrypt, Argon2): Deliberately slow and memory-intensive to resist brute force.
Key derivation (PBKDF2, Scrypt): Repeatedly apply a pseudorandom function (e.g., HMAC-SHA256) with password and salt. PBKDF2: DK = PRF(password, salt||1) ⊕ PRF(password, salt||2) ⊕ ...; Scrypt adds memory-hardness.
Non-cryptographic (CRC32, Adler-32, xxHash, FNV-1a): Fast checksums for error detection. CRC uses polynomial division; FNV uses multiply-XOR. Not secure—collisions are easy to find.
3. About Hash Calculator
This free online hash calculator supports 19 algorithms: MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3, Keccak-256, CRC32, Adler-32, xxHash, BLAKE2, RIPEMD-160, Bcrypt, Argon2, PBKDF2, Scrypt, Whirlpool, and FNV-1a.
All hash computation runs entirely in your browser. Your data—including passwords and files—never leaves your device. No server-side processing, no logging, no transmission.
Use this tool for file integrity verification, checksum validation, password hashing, key derivation, or cryptographic development. Each algorithm page provides detailed usage, how it works, and real-world use cases.
4. Advantages
- Privacy: All processing is client-side. Passwords and sensitive files never touch any server.
- 19 algorithms: From legacy (MD5) to modern (Argon2, SHA-3), plus non-cryptographic (CRC32, xxHash).
- File and text: Most algorithms support both text input and file upload.
- Verify: Compare hashes or test passwords against stored values directly in the tool.
- No installation: Works in any modern browser without plugins or downloads.
5. Real-World Use Cases
- File download verification: Compare SHA-256 or MD5 of a downloaded file with the published checksum.
- Password storage: Generate Bcrypt or Argon2 hashes for secure password storage in applications.
- Git and version control: Verify Git object hashes (SHA-1) or checksums.
- Blockchain: SHA-256 for Bitcoin; Keccak-256 for Ethereum; Scrypt for Litecoin.
- Digital signatures: Hash documents with SHA-256 or SHA-512 before signing.
- Database deduplication: Use xxHash or CRC32 for fast content addressing.
- TLS and certificates: SHA-256, SHA-384 for certificate fingerprints and TLS handshakes.
- Legacy systems: MD5, SHA-1 for compatibility with older protocols and tools.