Hash Calculator
Online hash calculator for files and text
Generate hash values for files or text in your browser. Good for checksum checks, password-hash testing, and quick dev verification.
MD5
128-bit hash. Legacy use for file integrity. Not recommended for security.
Generate MD5 hash →SHA-1
160-bit hash. Widely used for checksums. Deprecated for security.
Generate SHA-1 hash →SHA-224
224-bit hash. Truncated SHA-256. Used in TLS, DNSSEC.
Generate SHA-224 hash →SHA-256
256-bit hash. Industry standard for data integrity and cryptography.
Generate SHA-256 hash →SHA-384
384-bit hash. Truncated SHA-512. Good balance of security and output size.
Generate SHA-384 hash →SHA-512
512-bit hash. Maximum security. Used in TLS, digital signatures.
Generate SHA-512 hash →SHA-3
Next-gen Keccak. SHA3-224, 256, 384, 512. NIST standard.
Generate SHA-3 hash →Keccak-256
Original Keccak (not SHA3). Used in Ethereum, Web3, smart contracts.
Generate Keccak-256 hash →CRC32
32-bit checksum. Non-cryptographic. Used in ZIP, PNG, Git.
Generate CRC32 hash →Adler-32
32-bit checksum. Non-cryptographic. Used in zlib, PNG. Faster than CRC32.
Generate Adler-32 hash →xxHash
Extremely fast non-cryptographic hash. xxHash32, xxHash64. Used for deduplication.
Generate xxHash hash →BLAKE2
Fast cryptographic hash. BLAKE2b (256/512-bit), BLAKE2s (256-bit). RFC 7693.
Generate BLAKE2 hash →RIPEMD-160
160-bit European standard. Used in Bitcoin addresses.
Generate RIPEMD-160 hash →Bcrypt
Password hashing with salt. Slow by design. Recommended for passwords.
Generate Bcrypt hash →Argon2
Winner of Password Hashing Competition. Argon2id/2i/2d. Memory-hard, resistant to GPU attacks.
Generate Argon2 hash →PBKDF2
Key derivation from password. RFC 2898. Used in TLS, WPA2, Django, many frameworks.
Generate PBKDF2 hash →Scrypt
Memory-hard key derivation. RFC 7914. Used in many cryptocurrencies, Unix passwords.
Generate Scrypt hash →Whirlpool
512-bit hash. ISO/IEC 10118-3. Used in digital signatures, some cryptocurrencies.
Generate Whirlpool hash →FNV-1a
Fast non-cryptographic hash. 32–1024 bit. URLs, hostnames, checksums.
Generate FNV-1a hash →Hash Calculator Guide
Pick the algorithm by purpose: SHA-256 for file integrity, Argon2 or Bcrypt for passwords, CRC32 or xxHash for fast checks.
1. How do I compute MD5, SHA, or other hashes from this index?
- Pick the algorithm first: SHA-256 for file integrity, Bcrypt/Argon2 for passwords, CRC32/xxHash for fast checksums.
- Paste text or upload a file, then generate the hash on the algorithm page.
- If you hash passwords, keep the full output and parameters (salt, rounds, memory, iterations) so you can verify later.
- Use Verify to compare a known hash with new input.
- For download checks, hash the file and compare it with the published checksum.
2. How do hash calculators derive digests entirely in my browser?
Hash functions always return a fixed-length digest from your input.
Cryptographic hashes (SHA-2, SHA-3, BLAKE2, RIPEMD) are built for integrity and tamper detection.
Password hashers (Bcrypt, Argon2, PBKDF2, Scrypt) are intentionally slow to make brute-force attacks harder.
Fast checksums (CRC32, Adler-32, xxHash, FNV-1a) are for speed and corruption checks, not security.
Everything here runs client-side in your browser.
3. What hash algorithms are supported here, and how do I choose one?
This online hash calculator covers common cryptographic hashes, password hashing methods, and fast checksum tools.
Use it for file verification, password-hash testing, and development checks.
No install and no upload to a server.
4. Why generate checksums online when files never leave your device?
- Client-side processing.
- Text and file support.
- Hash verification flow.
- Broad algorithm coverage.
- No setup required.
5. When do developers and IT teams rely on quick hash utilities?
- Verify downloaded installers with SHA-256 checksums.
- Generate Bcrypt or Argon2 hashes while building auth features.
- Check Git, cert, or blockchain-related hashes during debugging.
- Use xxHash or CRC32 for quick dedup and integrity checks.