← Back to all tools

Hash Generator

Generate cryptographic hashes, HMAC signatures, and Bcrypt password hashes.

#

Hash Generator

Hash Output
Hash will appear here β€” updates as you type…
πŸ›‘οΈ

HMAC Generator

β„Ή
HMAC (Hash-based Message Authentication Code) verifies both data integrity and authenticity using a shared secret key.
HMAC Output
HMAC signature will appear here…
πŸ”‘

Bcrypt Password Hashing

β„Ή
Bcrypt is designed for hashing passwords. Higher rounds = slower = more secure. Default of 10 is a good balance for most applications.
Output
Bcrypt hash or verification result will appear here…
❓

Frequently Asked Questions

What is the difference between SHA-256 and MD5?
SHA-256 produces a 256-bit hash and is cryptographically secure for modern use. MD5 produces a 128-bit hash and is deprecated for security purposes due to known collision vulnerabilities β€” use SHA-256 or SHA-3 instead.
Can I reverse a hash?
No. Hash functions are one-way by design. It is computationally infeasible to recover the original input from a hash output. This is what makes hashing suitable for password storage and data integrity checks.
What is HMAC?
HMAC (Hash-based Message Authentication Code) combines a hash function with a secret key to produce an authentication code. It verifies both the integrity and authenticity of a message, ensuring it was not altered and came from the expected sender.
Is SHA-1 still safe to use?
SHA-1 is no longer considered cryptographically secure β€” collision attacks have been demonstrated. It should not be used for security-sensitive applications like digital signatures or certificate signing. Use SHA-256 or SHA-3 instead. SHA-1 is still acceptable for non-security uses like checksums.
How do I verify a file's integrity using a hash?
Hash the file and compare the output to the expected hash provided by the file source. If the hashes match, the file is intact and unmodified. This is commonly used to verify downloaded software and backups.
What is the Bcrypt cost factor?
The cost factor (also called work factor or rounds) controls how slow the hashing operation is. A higher cost factor means more computational work, making brute-force attacks harder. Cost 10 is the recommended default. Increase it as hardware gets faster.