Input Text
MD5 (128-bit)
Enter text above to generate hash
SHA-1 (160-bit)
Enter text above to generate hash
SHA-256 (256-bit)
Enter text above to generate hash
SHA-384 (384-bit)
Enter text above to generate hash
SHA-512 (512-bit)
Enter text above to generate hash
About Cryptographic Hashing
A cryptographic hash function takes an input of any size and produces a fixed-size output (the hash or digest). Hashing is one-way - you cannot recover the original input from the hash. The same input always produces the same hash, and even a tiny change in input produces a completely different output (the avalanche effect).
What is Hashing?
- One-way - cannot be reversed to recover the original input
- Deterministic - the same input always produces the same hash
- Fixed output - output length is always the same regardless of input size
- Avalanche effect - a small change in input drastically changes the output
Hash Algorithms Compared
| Algorithm | Output Size | Status |
|---|---|---|
MD5 | 128-bit (32 hex chars) | Broken - collision attacks demonstrated |
SHA-1 | 160-bit (40 hex chars) | Deprecated - practical collision found in 2017 |
SHA-256 | 256-bit (64 hex chars) | Recommended - widely used, no known weaknesses |
SHA-384 | 384-bit (96 hex chars) | Secure - truncated SHA-512, extra margin |
SHA-512 | 512-bit (128 hex chars) | Secure - larger output, faster on 64-bit systems |
Hashing vs Encryption
| Property | Hashing | Encryption |
|---|---|---|
| Direction | One-way (irreversible) | Two-way (reversible with key) |
| Key required | No | Yes |
| Output size | Fixed length | Variable (depends on input) |
| Purpose | Integrity verification | Confidentiality protection |