Compute and verify file checksums using 15+ hash algorithms. Works entirely in your browser - no uploads, 100% private.
Hash results will appear here
Select algorithms and click "Compute Selected"
Cryptographic hashes standardized by NIST. SHA‑256 (32 bytes) is widely used for file checksums and integrity. SHA‑1 (20 bytes) is deprecated for collision resistance.
Keccak sponge construction. Alternative to SHA‑2, with different internal design; similar output sizes (224, 256, 384, 512 bits).
Legacy checksum only (16 bytes). Fast but broken for collisions; do not use for security. Still useful for deduping and legacy tooling.
Legacy cryptographic hash (20 bytes) used in some blockchain address pipelines. Stronger than MD5/SHA‑1, but generally replaced by SHA‑2/3.
Non‑cryptographic checksums (4 bytes) for error detection (archives, storage). CRC32C uses the Castagnoli polynomial and is common in storage systems.
Very fast checksum (4 bytes, zlib). Good for accidental error detection, not for security.
Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.