Hash Generator
Generate cryptographic hashes from text using SHA-2 algorithms.
How It Works
A cryptographic hash function takes any input and produces a fixed-length fingerprint. The same input always produces the same hash; even a single character change produces a completely different output. This makes hashes useful for verifying data integrity, generating checksums, and storing passwords.
This tool uses the browser's built-in crypto.subtle.digest API, part of the Web
Crypto standard. All three algorithms here belong to the SHA-2 family:
SHA-256 produces a 256-bit (64 hex character) digest, SHA-384 produces 384 bits, and SHA-512
produces 512 bits. Longer digests provide more collision resistance.
MD5 and SHA-1 are intentionally excluded — both have known collision vulnerabilities and are no longer considered cryptographically secure. SHA-256 or higher is recommended for all new applications.