Generate message digests using 50+ hash algorithms including MD5, SHA-1, SHA-256, SHA-512, SHA-3, RIPEMD, BLAKE2b, and more.
Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.
Hashing is NOT encryption. There is no secret, no key in hashing.
A hash function is a mathematical function that converts an input (message) of arbitrary length into a fixed-size output (hash value or digest).
Hashing is a function from some bit string (usually variable length) to another bit string (usually smaller, and of fixed length). The output is called a hash value, hash code, digest, or simply hash.
Variable length message
Mathematical transformation
Fixed length hash value
This table shows the cryptographic strength of different SHA algorithms. Higher bit values indicate stronger security.
| Security Property | SHA-1 Deprecated | SHA-224 | SHA-256 | SHA-384 | SHA-512 | SHA-512/224 | SHA-512/256 |
|---|---|---|---|---|---|---|---|
| Collision Resistance | < 80 bits | 112 bits | 128 bits | 192 bits | 256 bits | 112 bits | 128 bits |
| Preimage Resistance | 160 bits | 224 bits | 256 bits | 384 bits | 512 bits | 224 bits | 256 bits |
| Second Preimage Resistance | 105-160 bits | 201-224 bits | 201-256 bits | 384 bits | 394-512 bits | 224 bits | 256 bits |
Browse through common hash functions and their output lengths. Use the search box to filter results.
| Hash Function Name | Output Length | Status |
|---|---|---|
| MD2 MD Family | 128 bits (16 bytes) | Deprecated |
| MD4 MD Family | 128 bits (16 bytes) | Deprecated |
| MD5 MD Family | 128 bits (16 bytes) | Weak |
| MD6 MD Family | Up to 512 bits | Not Standard |
| SHA-1 SHA Family | 160 bits (20 bytes) | Deprecated |
| SHA-224 SHA-2 | 224 bits (28 bytes) | Recommended |
| SHA-256 SHA-2 | 256 bits (32 bytes) | Recommended |
| SHA-384 SHA-2 | 384 bits (48 bytes) | Recommended |
| SHA-512 SHA-2 | 512 bits (64 bytes) | Recommended |
| SHA-512/224 SHA-2 | 224 bits (28 bytes) | Recommended |
| SHA-512/256 SHA-2 | 256 bits (32 bytes) | Recommended |
| SHA3-224 SHA-3 | 224 bits (28 bytes) | Modern Standard |
| SHA3-256 SHA-3 | 256 bits (32 bytes) | Modern Standard |
| SHA3-384 SHA-3 | 384 bits (48 bytes) | Modern Standard |
| SHA3-512 SHA-3 | 512 bits (64 bytes) | Modern Standard |
| RIPEMD-128 RIPEMD | 128 bits (16 bytes) | Weak |
| RIPEMD-160 RIPEMD | 160 bits (20 bytes) | Legacy |
| RIPEMD-256 RIPEMD | 256 bits (32 bytes) | Legacy |
| RIPEMD-320 RIPEMD | 320 bits (40 bytes) | Legacy |
| BLAKE2b-160 BLAKE2b | 160 bits (20 bytes) | Modern |
| BLAKE2b-256 BLAKE2b | 256 bits (32 bytes) | Modern |
| BLAKE2b-384 BLAKE2b | 384 bits (48 bytes) | Modern |
| BLAKE2b-512 BLAKE2b | 512 bits (64 bytes) | Modern |
| TIGER TIGER | 192 bits (24 bytes) | Legacy |
| Whirlpool Whirlpool | 512 bits (64 bytes) | Legacy |
| SM3 Chinese Standard | 256 bits (32 bytes) | Standard |
| GOST R 34.11-94 GOST | 256 bits (32 bytes) | Russian Standard |
| GOST R 34.11-2012 (256) GOST | 256 bits (32 bytes) | Russian Standard |
| GOST R 34.11-2012 (512) GOST | 512 bits (64 bytes) | Russian Standard |
| DSTU 7564:2014 (256) DSTU | 256 bits (32 bytes) | Ukrainian Standard |
| DSTU 7564:2014 (384) DSTU | 384 bits (48 bytes) | Ukrainian Standard |
| DSTU 7564:2014 (512) DSTU | 512 bits (64 bytes) | Ukrainian Standard |
| Keccak-224 Keccak | 224 bits (28 bytes) | Modern |
| Keccak-256 Keccak | 256 bits (32 bytes) | Modern |
| Keccak-384 Keccak | 384 bits (48 bytes) | Modern |
| Keccak-512 Keccak | 512 bits (64 bytes) | Modern |
| SKEIN-256-256 SKEIN | 256 bits (32 bytes) | Alternative |
| SKEIN-512-512 SKEIN | 512 bits (64 bytes) | Alternative |
| SKEIN-1024-1024 SKEIN | 1024 bits (128 bytes) | Alternative |