Generate cryptographic hashes using SHA-1, SHA-256, SHA-384, and SHA-512 algorithms.
Enter text or upload a file to generate hashes
Hash functions generate fixed-size outputs from arbitrary input data. They are one-way functions - you cannot reverse a hash to get the original input.
Legacy algorithm, not recommended for security
Recommended, widely used in Bitcoin, TLS
Truncated SHA-512, higher security
Highest security, better on 64-bit systems