Text Input
0 characters
Select Algorithms
File Upload
Drag & drop a file here
or click to browse
Max 100MB for best performance
Batch File Hashing
0 files
Drag & drop multiple files here
or click to browse
Select multiple files to hash at once
No files selected
HMAC Generator
💡 Common Use Cases
- API Authentication: Sign API requests with HMAC
- Webhook Verification: Verify webhook payloads
- Message Authentication: Ensure message integrity
- JWT Signing: Sign JSON Web Tokens
Hash Comparison
Enter hashes to compare
💡 How to Use
- Generate a hash from your file/text (using Text or File mode)
- Copy the generated hash
- Paste it in "Hash 1" field above
- Paste the expected/known hash in "Hash 2" field
- Compare to verify they match
Common use: Verify downloaded files haven't been corrupted or tampered with.
Checksum File Verification
Paste checksum file contents above
💡 How to Use
- Copy contents from a .sha256, .md5, or checksum file
- Paste it in the text area above
- Select the files you want to verify
- Click "Verify Files" to check integrity
Tip: Download pages often provide checksum files to verify your downloads.
What Are Hashes?
🔐 What is a Hash?
A hash is a unique fixed-size string generated from input data using a mathematical algorithm. The same input always produces the same hash, but even tiny changes create completely different hashes.
🎯 When to Use Hashes
- File Integrity: Verify downloads aren't corrupted
- Password Storage: Store hashed passwords, not plaintext
- Digital Signatures: Prove authenticity
- Data Deduplication: Identify duplicate files
- Blockchain: Bitcoin and cryptocurrencies
📊 Which Algorithm to Use?
- MD5 ❌ Broken - Don't use for security
- SHA-1 ⚠️ Weakened - Being phased out
- SHA-256 ✅ Recommended - Industry standard
- SHA-512 ✅ More secure - Longer hash
- SHA-3 ✅ Modern - Latest standard
⚠️ Security Notes
- Hashing is NOT encryption (cannot be reversed)
- Hashes are deterministic (same input = same output)
- Even 1 byte change creates completely different hash
- Use for verification, not hiding secrets
- Never store passwords in plaintext!