Message Digest Calculator Online – Free | 8gwifi.org

Message Digest Calculator

Generate message digests using 50+ hash algorithms including MD5, SHA-1, SHA-256, SHA-512, SHA-3, RIPEMD, BLAKE2b, and more.

Author: Anish Nath Last Updated: January 2025 Privacy-First - No data stored
Input Message
Enter any text to calculate its hash using selected algorithms
Hold Ctrl/Cmd to select multiple algorithms. Results update automatically as you type.
Hash Results
Loading...

Calculating message digest...

Hash results will appear here

Enter your message and select algorithms to generate hashes



Support This Free Tool

Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.

500K+ users
200+ tools
100% private
Privacy Guarantee: Private keys you enter or generate are never stored on our servers. All tools are served over HTTPS.

About Message Digests
Important Distinction

Hashing is NOT encryption. There is no secret, no key in hashing.

What is a Hash Function?

A hash function is a mathematical function that converts an input (message) of arbitrary length into a fixed-size output (hash value or digest).

Key Characteristics
  • Deterministic: Same input always produces same output
  • Fixed Output Size: Output length is constant regardless of input size
  • One-Way Function: Cannot reverse to get original input
  • Fast Computation: Efficient to calculate hash value
Common Use Cases
  • Data Integrity: Verify files haven't been modified
  • Password Storage: Store hashed passwords (with salt)
  • Digital Signatures: Sign documents and messages
  • Blockchain: Link blocks in cryptocurrency
  • Deduplication: Identify duplicate files
What Hashing is NOT
  • Not Encryption: Cannot decrypt to get original
  • Not Compression: Output can be larger than input
  • Not Reversible: One-way function only

Technical Definition

Hashing is a function from some bit string (usually variable length) to another bit string (usually smaller, and of fixed length). The output is called a hash value, hash code, digest, or simply hash.

Input

Variable length message

Hash Function

Mathematical transformation

Output

Fixed length hash value



Strengths of the Security Properties of the Approved Hash Algorithms

This table shows the cryptographic strength of different SHA algorithms. Higher bit values indicate stronger security.

Security Property SHA-1 Deprecated SHA-224 SHA-256 SHA-384 SHA-512 SHA-512/224 SHA-512/256
Collision Resistance < 80 bits 112 bits 128 bits 192 bits 256 bits 112 bits 128 bits
Preimage Resistance 160 bits 224 bits 256 bits 384 bits 512 bits 224 bits 256 bits
Second Preimage Resistance 105-160 bits 201-224 bits 201-256 bits 384 bits 394-512 bits 224 bits 256 bits
Recommendation: For new applications, use SHA-256 or higher. SHA-1 is deprecated and should not be used for security-critical applications.

Hash Functions and Their Output Lengths

Browse through common hash functions and their output lengths. Use the search box to filter results.

Hash Function Name Output Length Status
MD2 MD Family 128 bits (16 bytes) Deprecated
MD4 MD Family 128 bits (16 bytes) Deprecated
MD5 MD Family 128 bits (16 bytes) Weak
MD6 MD Family Up to 512 bits Not Standard
SHA-1 SHA Family 160 bits (20 bytes) Deprecated
SHA-224 SHA-2 224 bits (28 bytes) Recommended
SHA-256 SHA-2 256 bits (32 bytes) Recommended
SHA-384 SHA-2 384 bits (48 bytes) Recommended
SHA-512 SHA-2 512 bits (64 bytes) Recommended
SHA-512/224 SHA-2 224 bits (28 bytes) Recommended
SHA-512/256 SHA-2 256 bits (32 bytes) Recommended
SHA3-224 SHA-3 224 bits (28 bytes) Modern Standard
SHA3-256 SHA-3 256 bits (32 bytes) Modern Standard
SHA3-384 SHA-3 384 bits (48 bytes) Modern Standard
SHA3-512 SHA-3 512 bits (64 bytes) Modern Standard
RIPEMD-128 RIPEMD 128 bits (16 bytes) Weak
RIPEMD-160 RIPEMD 160 bits (20 bytes) Legacy
RIPEMD-256 RIPEMD 256 bits (32 bytes) Legacy
RIPEMD-320 RIPEMD 320 bits (40 bytes) Legacy
BLAKE2b-160 BLAKE2b 160 bits (20 bytes) Modern
BLAKE2b-256 BLAKE2b 256 bits (32 bytes) Modern
BLAKE2b-384 BLAKE2b 384 bits (48 bytes) Modern
BLAKE2b-512 BLAKE2b 512 bits (64 bytes) Modern
TIGER TIGER 192 bits (24 bytes) Legacy
Whirlpool Whirlpool 512 bits (64 bytes) Legacy
SM3 Chinese Standard 256 bits (32 bytes) Standard
GOST R 34.11-94 GOST 256 bits (32 bytes) Russian Standard
GOST R 34.11-2012 (256) GOST 256 bits (32 bytes) Russian Standard
GOST R 34.11-2012 (512) GOST 512 bits (64 bytes) Russian Standard
DSTU 7564:2014 (256) DSTU 256 bits (32 bytes) Ukrainian Standard
DSTU 7564:2014 (384) DSTU 384 bits (48 bytes) Ukrainian Standard
DSTU 7564:2014 (512) DSTU 512 bits (64 bytes) Ukrainian Standard
Keccak-224 Keccak 224 bits (28 bytes) Modern
Keccak-256 Keccak 256 bits (32 bytes) Modern
Keccak-384 Keccak 384 bits (48 bytes) Modern
Keccak-512 Keccak 512 bits (64 bytes) Modern
SKEIN-256-256 SKEIN 256 bits (32 bytes) Alternative
SKEIN-512-512 SKEIN 512 bits (64 bytes) Alternative
SKEIN-1024-1024 SKEIN 1024 bits (128 bytes) Alternative
Tip: SHA-256 and SHA-512 are the most commonly used hash functions today. SHA-3 (Keccak) and BLAKE2b are modern alternatives with excellent security properties. This tool supports 50+ hash algorithms including international standards (GOST, DSTU, SM3).