Générateur de hachage
Générer des hachages MD5, SHA-1, SHA-256
Texte d'entrée
Résultat
MD5
128-bit hash function
Résultat videSHA-1
160-bit hash function
Résultat videSHA-256
256-bit hash function
Résultat videSHA-512
512-bit hash function
Résultat videBase64
Base64 encoding
Résultat videTitre de sécurité
Avis de sécurité
tools.common.features
Fonctionnalité sécurisée
Description de la fonctionnalité sécurisée
Fonctionnalité rapide
Description rapide des fonctionnalités
Fonctionnalité multiple
Description multiple des fonctionnalités
Article de fond
Description du texte de présentation
Supported Hash Algorithms
MD5 (Message-Digest Algorithm 5)
A 128-bit hash function. While no longer recommended for security purposes, it's still widely used for checksums and non-cryptographic applications.
SHA-1 (Secure Hash Algorithm 1)
A 160-bit hash function. Deprecated for security use but still found in legacy systems and version control (Git).
SHA-256
A 256-bit hash from the SHA-2 family. Widely used in security applications, including Bitcoin and SSL certificates.
SHA-512
A 512-bit hash offering higher security than SHA-256. Used when maximum security is required.
Base64
Not a hash but an encoding scheme. Converts binary data to ASCII text for safe transmission over text-based protocols.
tools.common.how_to_use
- Enter or paste the text you want to hash in the input field
- Hash values are generated automatically for all algorithms
- Click "Copy" to copy any hash value to your clipboard
tools.common.faq
What is a hash function?
A hash function converts input data of any size into a fixed-size output (hash). The same input always produces the same hash, but it's computationally infeasible to reverse the process.
Which hash algorithm should I use?
For security purposes, use SHA-256 or SHA-512. For checksums and non-security applications, MD5 is faster. Never use MD5 or SHA-1 for password hashing or security-critical applications.
Is my data sent to a server?
No, all hashing is performed locally in your browser using the Web Crypto API. Your data never leaves your device.