Générateur de hachage

Générer des hachages MD5, SHA-1, SHA-256

Texte d'entrée

Résultat

MD5

128-bit hash function

Résultat vide

SHA-1

160-bit hash function

Résultat vide

SHA-256

256-bit hash function

Résultat vide

SHA-512

512-bit hash function

Résultat vide

Base64

Base64 encoding

Résultat vide
⚠️

Titre de sécurité

Avis de sécurité

tools.common.features

🔐

Fonctionnalité sécurisée

Description de la fonctionnalité sécurisée

Fonctionnalité rapide

Description rapide des fonctionnalités

🔄

Fonctionnalité multiple

Description multiple des fonctionnalités

📋

Article de fond

Description du texte de présentation

Supported Hash Algorithms

MD5 (Message-Digest Algorithm 5)

A 128-bit hash function. While no longer recommended for security purposes, it's still widely used for checksums and non-cryptographic applications.

SHA-1 (Secure Hash Algorithm 1)

A 160-bit hash function. Deprecated for security use but still found in legacy systems and version control (Git).

SHA-256

A 256-bit hash from the SHA-2 family. Widely used in security applications, including Bitcoin and SSL certificates.

SHA-512

A 512-bit hash offering higher security than SHA-256. Used when maximum security is required.

Base64

Not a hash but an encoding scheme. Converts binary data to ASCII text for safe transmission over text-based protocols.

tools.common.how_to_use

  1. Enter or paste the text you want to hash in the input field
  2. Hash values are generated automatically for all algorithms
  3. Click "Copy" to copy any hash value to your clipboard

tools.common.faq

What is a hash function?

A hash function converts input data of any size into a fixed-size output (hash). The same input always produces the same hash, but it's computationally infeasible to reverse the process.

Which hash algorithm should I use?

For security purposes, use SHA-256 or SHA-512. For checksums and non-security applications, MD5 is faster. Never use MD5 or SHA-1 for password hashing or security-critical applications.

Is my data sent to a server?

No, all hashing is performed locally in your browser using the Web Crypto API. Your data never leaves your device.

Hash Generator - MD5, SHA-1, SHA-256, SHA-512 | Free Online Tool