Hash Calculator

hash

Generate cryptographic hashes from text or files. All processing runs locally in your browser—your data never leaves your device.

MD5

128-bit hash. Legacy use for file integrity. Not recommended for security.

Generate MD5 hash →

SHA-1

160-bit hash. Widely used for checksums. Deprecated for security.

Generate SHA-1 hash →

SHA-224

224-bit hash. Truncated SHA-256. Used in TLS, DNSSEC.

Generate SHA-224 hash →

SHA-256

256-bit hash. Industry standard for data integrity and cryptography.

Generate SHA-256 hash →

SHA-384

384-bit hash. Truncated SHA-512. Good balance of security and output size.

Generate SHA-384 hash →

SHA-512

512-bit hash. Maximum security. Used in TLS, digital signatures.

Generate SHA-512 hash →

SHA-3

Next-gen Keccak. SHA3-224, 256, 384, 512. NIST standard.

Generate SHA-3 hash →

Keccak-256

Original Keccak (not SHA3). Used in Ethereum, Web3, smart contracts.

Generate Keccak-256 hash →

CRC32

32-bit checksum. Non-cryptographic. Used in ZIP, PNG, Git.

Generate CRC32 hash →

Adler-32

32-bit checksum. Non-cryptographic. Used in zlib, PNG. Faster than CRC32.

Generate Adler-32 hash →

xxHash

Extremely fast non-cryptographic hash. xxHash32, xxHash64. Used for deduplication.

Generate xxHash hash →

BLAKE2

Fast cryptographic hash. BLAKE2b (256/512-bit), BLAKE2s (256-bit). RFC 7693.

Generate BLAKE2 hash →

RIPEMD-160

160-bit European standard. Used in Bitcoin addresses.

Generate RIPEMD-160 hash →

Bcrypt

Password hashing with salt. Slow by design. Recommended for passwords.

Generate Bcrypt hash →

Argon2

Winner of Password Hashing Competition. Argon2id/2i/2d. Memory-hard, resistant to GPU attacks.

Generate Argon2 hash →

PBKDF2

Key derivation from password. RFC 2898. Used in TLS, WPA2, Django, many frameworks.

Generate PBKDF2 hash →

Scrypt

Memory-hard key derivation. RFC 7914. Used in many cryptocurrencies, Unix passwords.

Generate Scrypt hash →

Whirlpool

512-bit hash. ISO/IEC 10118-3. Used in digital signatures, some cryptocurrencies.

Generate Whirlpool hash →

FNV-1a

Fast non-cryptographic hash. 32–1024 bit. URLs, hostnames, checksums.

Generate FNV-1a hash →

1. How to Use

  1. Choose an algorithm from the grid above (e.g., MD5, SHA-256, Bcrypt). Each link opens a dedicated calculator for that algorithm.
  2. For general hashing (MD5, SHA-1, SHA-256, etc.): Enter text in the input box or drag-and-drop a file. Click the generate button.
  3. For password hashing (Bcrypt, Argon2, PBKDF2, Scrypt): Enter your password, configure parameters (rounds, memory, iterations), and generate. Use Verify to test passwords.
  4. For checksums (CRC32, Adler-32, xxHash, FNV-1a): Enter text or upload a file. These are non-cryptographic—use for integrity, not security.
  5. Use the Verify section on each algorithm page to compare a hash against new input or test a password against a stored hash.
  6. Copy results with one click. Store hashes and parameters (salt, iterations) for password algorithms—you need them for verification.
  7. File support: Most algorithms accept file upload. Password hashers typically use text input only.

2. How It Works

Hash functions map arbitrary-length input to fixed-length output. Cryptographic hashes (SHA-256, BLAKE2, etc.) are designed so that finding two inputs with the same hash (collision) or reversing the hash (preimage) is computationally infeasible.

Merkle–Damgård hashes (MD5, SHA-1, SHA-256): Input is padded and split into blocks. Each block is mixed with an internal state via a compression function. Final state is the hash. Formula: H_i = f(H_{i-1}, M_i); output = H_n.

Sponge hashes (SHA-3, Keccak): Absorb input into a large state, then squeeze output. Resistant to length-extension attacks. Password hashes (Bcrypt, Argon2): Deliberately slow and memory-intensive to resist brute force.

Key derivation (PBKDF2, Scrypt): Repeatedly apply a pseudorandom function (e.g., HMAC-SHA256) with password and salt. PBKDF2: DK = PRF(password, salt||1) ⊕ PRF(password, salt||2) ⊕ ...; Scrypt adds memory-hardness.

Non-cryptographic (CRC32, Adler-32, xxHash, FNV-1a): Fast checksums for error detection. CRC uses polynomial division; FNV uses multiply-XOR. Not secure—collisions are easy to find.

3. About Hash Calculator

This free online hash calculator supports 19 algorithms: MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3, Keccak-256, CRC32, Adler-32, xxHash, BLAKE2, RIPEMD-160, Bcrypt, Argon2, PBKDF2, Scrypt, Whirlpool, and FNV-1a.

All hash computation runs entirely in your browser. Your data—including passwords and files—never leaves your device. No server-side processing, no logging, no transmission.

Use this tool for file integrity verification, checksum validation, password hashing, key derivation, or cryptographic development. Each algorithm page provides detailed usage, how it works, and real-world use cases.

4. Advantages

  • Privacy: All processing is client-side. Passwords and sensitive files never touch any server.
  • 19 algorithms: From legacy (MD5) to modern (Argon2, SHA-3), plus non-cryptographic (CRC32, xxHash).
  • File and text: Most algorithms support both text input and file upload.
  • Verify: Compare hashes or test passwords against stored values directly in the tool.
  • No installation: Works in any modern browser without plugins or downloads.

5. Real-World Use Cases

  • File download verification: Compare SHA-256 or MD5 of a downloaded file with the published checksum.
  • Password storage: Generate Bcrypt or Argon2 hashes for secure password storage in applications.
  • Git and version control: Verify Git object hashes (SHA-1) or checksums.
  • Blockchain: SHA-256 for Bitcoin; Keccak-256 for Ethereum; Scrypt for Litecoin.
  • Digital signatures: Hash documents with SHA-256 or SHA-512 before signing.
  • Database deduplication: Use xxHash or CRC32 for fast content addressing.
  • TLS and certificates: SHA-256, SHA-384 for certificate fingerprints and TLS handshakes.
  • Legacy systems: MD5, SHA-1 for compatibility with older protocols and tools.
← Back to home