Input Text
MD5 (128-bit)
Enter text above to generate hash
SHA-1 (160-bit)
Enter text above to generate hash
SHA-256 (256-bit)
Enter text above to generate hash
SHA-384 (384-bit)
Enter text above to generate hash
SHA-512 (512-bit)
Enter text above to generate hash

About Cryptographic Hashing

A cryptographic hash function takes an input of any size and produces a fixed-size output (the hash or digest). Hashing is one-way - you cannot recover the original input from the hash. The same input always produces the same hash, and even a tiny change in input produces a completely different output (the avalanche effect).

What is Hashing?

  • One-way - cannot be reversed to recover the original input
  • Deterministic - the same input always produces the same hash
  • Fixed output - output length is always the same regardless of input size
  • Avalanche effect - a small change in input drastically changes the output

Hash Algorithms Compared

Algorithm Output Size Status
MD5128-bit (32 hex chars)Broken - collision attacks demonstrated
SHA-1160-bit (40 hex chars)Deprecated - practical collision found in 2017
SHA-256256-bit (64 hex chars)Recommended - widely used, no known weaknesses
SHA-384384-bit (96 hex chars)Secure - truncated SHA-512, extra margin
SHA-512512-bit (128 hex chars)Secure - larger output, faster on 64-bit systems

Hashing vs Encryption

Property Hashing Encryption
DirectionOne-way (irreversible)Two-way (reversible with key)
Key requiredNoYes
Output sizeFixed lengthVariable (depends on input)
PurposeIntegrity verificationConfidentiality protection