Cybersecurity Tools
SHA Hash Generator
Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text input. Supports HMAC signing with a secret key, all-algorithm comparison output, and hash equality checking. Uses the browser's native Web Crypto API β no server involved.
All processing happens locally in your browser. No data is uploaded.
Algorithm
Input Text
Hash Output
Hash will appear hereβ¦
Input Text
HMAC (Hash-based Message Authentication Code) produces a hash that requires both the message and a secret key. Used to verify message authenticity and integrity.
Input Text
HMAC Output
HMAC will appear hereβ¦
Enter two hash strings to compare them for equality β useful for verifying file integrity or checking that two different texts produce the same hash.
SHA Algorithm Reference
| Algorithm | Output | Security | Common Uses |
|---|---|---|---|
| SHA-1 | 160 bits / 40 hex | Broken | Legacy checksums, Git commits (historical) |
| SHA-256 | 256 bits / 64 hex | Secure | SSL/TLS, Bitcoin, JWT, file integrity |
| SHA-384 | 384 bits / 96 hex | Secure | TLS 1.3, high-security applications |
| SHA-512 | 512 bits / 128 hex | Secure | Password storage, digital signatures |