Hash Generator (SHA-1, SHA-256, SHA-512)
Create cryptographic hashes using SHA-1, SHA-256, and SHA-512 algorithms. Ideal for checksums, integrity verification, and security applications.
Hash Generator
Select o tipo de hash:
🔒 What are hashes?
Hashes are one-way cryptographic functions that convert data into a fixed-size string. They are used for integrity verification, secure password storage and digital signatures.
⚠️ Security note:
• MD5 is no longer considered secure for cryptographic use
• SHA-256 and SHA-512 are widely used and secure
• Hashes are irreversible - it's not possible to get the original text
💡 Hash lengths:
• MD5 (SHA-1): 160 bits / 40 hex characters
• SHA-256: 256 bits / 64 hex characters
• SHA-512: 512 bits / 128 hex characters
What is a Hash Function?
A cryptographic hash function transforms any input (text, file, etc.) into a fixed-size string called a hash or digest. It's a one-way operation: you cannot reverse a hash to get the original text.
Available Algorithms
🟡 SHA-1 (160 bits / 40 characters)
Older algorithm, considered obsolete for security. Use only for compatibility with legacy systems.
⚠️ Vulnerable to collisions - don't use for new projects
🔵 SHA-256 (256 bits / 64 characters)
Current industry standard. Used in Bitcoin, SSL certificates, and digital signatures. Excellent balance between security and performance.
✓ Recommended for general use
🟣 SHA-512 (512 bits / 128 characters)
More secure than SHA-256, generates larger hashes. Ideal for applications requiring maximum security. Slower than SHA-256.
✓ Maximum security
What are Hashes used for?
- Integrity verification: Confirm files haven't been altered
- Password storage: Store passwords securely (never in plain text)
- Digital signatures: Verify document authenticity
- Blockchain: Foundation of cryptocurrencies like Bitcoin
- Checksums: Validate downloads and transfers
- Deduplication: Identify duplicate files
- Cache keys: Create unique keys for caching systems
Important Properties
🔒 Deterministic
Same input always generates same hash
⚡ Fast
Hash calculation is computationally efficient
🎲 Avalanche Effect
Small change in input completely changes hash
🚫 Irreversible
Impossible to get original input from hash
Practical Example
Input:
Hello, World!
SHA-256:
dffd6021bb2bd5b0af676290809ec3a53191dd81c7f70a4b28688a362182986f
Input (with minimal change):
Hello, World.
SHA-256:
c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a
Notice how a single change (! to .) results in a completely different hash
Hash vs Encryption
⚠️ Important: Hash is NOT encryption! Hashes cannot be reversed. Use encryption (AES, RSA) when you need to decrypt data. Use hash for verification and integrity.
Salt and Pepper
For passwords, always add "salt" (random data) before hashing. This prevents rainbow table attacks. Use specialized libraries like bcrypt or Argon2 for passwords.
🔒 Security: Hashes are calculated locally in your browser using Web Crypto API. Your data never leaves your device.