Hash Generator

Hashes are computed in your browser via the Web Crypto API where supported.

Understanding hash functions

One-way fingerprints

A hash function maps input of any size to a fixed-length string. Small changes in input produce completely different hashes — useful for checksums and integrity verification.

Do not use MD5 for passwords

Modern applications should use bcrypt, Argon2, or scrypt for password storage. MD5 and SHA-1 are deprecated for security-sensitive use cases.

More tutorials: Toolsminer Guides