Generate MD5, SHA-1, SHA-256, and SHA-512 hashes for text and verification.
A cryptographic hash function converts any input into a fixed-length string of characters. The same input always produces the same hash, but even a tiny change creates a completely different output.
0 characters
| Algorithm | Bits | Security |
|---|---|---|
| MD5 | 128 | Broken |
| SHA-1 | 160 | Weak |
| SHA-256 | 256 | Secure |
| SHA-512 | 512 | Secure |
For passwords: Never use plain hashes. Use dedicated password hashing functions like bcrypt, scrypt, or Argon2 that include salting and key stretching.
100% Client-Side: All hashing happens in your browser. Your data never leaves your device.
Formula
hash = H(message) → fixed-length digestH = Hash function (MD5, SHA-1, SHA-256, SHA-512)
message = Input data of arbitrary length
digest = Fixed-size output: 128 / 160 / 256 / 512 bits respectively
Worked Example
SHA-256 of "Hello, World!"
Did you know? SHA-256 powers Bitcoin mining — every block header must hash below a target value. The Bitcoin network computes trillions of SHA-256 hashes per second to secure the blockchain.
Sources
Convert text to ASCII codes and back. Supports decimal, hex, binary, and octal formats.
Convert width/height to aspect ratios, scale dimensions, and generate responsive embed CSS for any layout.
Calculate required internet bandwidth based on devices and activities in your household.
Encode and decode Base64 strings. Convert text for data URIs, APIs, and safe data transmission.
Create CSS border-radius with visual controls for each corner. Generate circles, pills, and custom shapes.
Create CSS box shadows with multiple layers, live preview, and copy-ready code.