How to Use
- Enter text.
- Select algorithm.
- Copy the hash.
Compute MD5, SHA-1, SHA-256, and other hashes from any text.
128-bit hash function. Fast but considered cryptographically broken.
160-bit hash function. No longer considered secure against attacks.
256-bit hash function. Part of SHA-2 family, currently secure.
Quick answers about this tool.
It’s considered cryptographically secure for many applications.
You can paste the file’s text content; binary hashing is not supported.