Generate SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text. Uses the Web Crypto API for cryptographically accurate results with one-click copy.
A cryptographic hash function takes an input of any size and produces a fixed-size string of characters. The same input always produces the same hash, but even a tiny change produces a completely different hash. Hash functions are one-way.
SHA-1 produces a 160-bit hash and is deprecated for security. SHA-256 produces a 256-bit hash and is widely used in TLS, Bitcoin, and file verification. SHA-384 and SHA-512 produce longer hashes for extra security.
Hashes are used for password storage, data integrity verification, digital signatures, blockchain technology, and deduplication.
More from TUDITOOLS