What Are Hash Functions?
A cryptographic hash function takes an input and returns a fixed-size string of characters. The same input always produces the same hash, but even a tiny change in input produces a completely different output.
Supported Algorithms
- MD5: 128-bit hash. Fast but no longer considered secure for cryptographic purposes.
- SHA-1: 160-bit hash. Deprecated for security use but still common in checksums.
- SHA-256: 256-bit hash from the SHA-2 family. Widely used and recommended.
- SHA-512: 512-bit hash from the SHA-2 family. Higher security for sensitive applications.
Common Use Cases
- File integrity verification (checksums)
- Data deduplication
- Digital signatures
- Password storage (with proper salting)
Frequently Asked Questions
Is hashing the same as encryption?
No. Hashing is a one-way function — you cannot reverse a hash to get the original input. Encryption is two-way and can be reversed with a key.
Are the hashes computed locally?
Yes. All hashing is done in your browser using the Web Crypto API. No data is sent to any server.