Hash Generator
生成 MD5、SHA-1 和 SHA-256 哈希值
输入文本
结果
MD5
128-bit hash function
Empty ResultSHA-1
160-bit hash function
Empty ResultSHA-256
256-bit hash function
Empty ResultSHA-512
512-bit hash function
Empty ResultBase64
Base64 encoding
Empty ResultSecurity Title
Security Notice
tools.common.features
Feature Secure
Feature Secure Desc
Feature Fast
Feature Fast Desc
Feature Multiple
Feature Multiple Desc
Feature Copy
Feature Copy Desc
Supported Hash Algorithms
MD5 (Message-Digest Algorithm 5)
A 128-bit hash function. While no longer recommended for security purposes, it's still widely used for checksums and non-cryptographic applications.
SHA-1 (Secure Hash Algorithm 1)
A 160-bit hash function. Deprecated for security use but still found in legacy systems and version control (Git).
SHA-256
A 256-bit hash from the SHA-2 family. Widely used in security applications, including Bitcoin and SSL certificates.
SHA-512
A 512-bit hash offering higher security than SHA-256. Used when maximum security is required.
Base64
Not a hash but an encoding scheme. Converts binary data to ASCII text for safe transmission over text-based protocols.
tools.common.how_to_use
- Enter or paste the text you want to hash in the input field
- Hash values are generated automatically for all algorithms
- Click "Copy" to copy any hash value to your clipboard
tools.common.faq
What is a hash function?
A hash function converts input data of any size into a fixed-size output (hash). The same input always produces the same hash, but it's computationally infeasible to reverse the process.
Which hash algorithm should I use?
For security purposes, use SHA-256 or SHA-512. For checksums and non-security applications, MD5 is faster. Never use MD5 or SHA-1 for password hashing or security-critical applications.
Is my data sent to a server?
No, all hashing is performed locally in your browser using the Web Crypto API. Your data never leaves your device.