How to Generate MD5, SHA-256, and Other Hashes Online

Cryptographic hash functions convert data into fixed-length strings (hashes) that uniquely identify that data. Hashes are used to verify file integrity, store passwords securely, create checksums, and generate unique identifiers. This guide shows you how to generate MD5, SHA-256, and other hashes using fixie.tools — a free browser-based tool that supports multiple hash algorithms, works with text and files, and requires no signup.

Step 1: Open the Hash Generator

Navigate to fixie.tools/hash in your web browser. The tool runs entirely in your browser for privacy — no data is uploaded to servers. All hash generation happens locally on your device. No account or software installation is required.

Step 2: Choose Your Hash Algorithm

Select the hash algorithm you want to use from the dropdown menu. Common options include MD5 (128-bit, fast but not cryptographically secure), SHA-1 (160-bit, deprecated for security), SHA-256 (256-bit, widely used and secure), SHA-512 (512-bit, maximum security), and others like SHA-3, BLAKE2, and RIPEMD. For password hashing or security purposes, use SHA-256 or higher. For file integrity checks, any algorithm works.

Step 3: Enter Your Data

Choose whether you want to hash text or a file. For text hashing, paste or type your text into the input field — this is useful for generating password hashes, creating unique identifiers from strings, or hashing API keys. For file hashing, click to upload a file — this is useful for verifying file integrity, checking download authenticity, or generating file checksums. Files up to 100MB are supported.

Step 4: Generate the Hash

Click the generate button to create the hash. Hash generation is instant for text and takes a few seconds for large files. The tool displays the hash in hexadecimal format (the standard representation). For files, you can see the hash update in real-time as the file is processed, which is helpful for large files.

Step 5: Copy and Verify

Use the copy button to copy the hash to your clipboard. If you're verifying a file download, compare the generated hash with the expected hash provided by the file source — they should match exactly. Even a single changed byte results in a completely different hash. The tool also supports batch hashing to generate multiple hash types simultaneously for comparison.

Frequently Asked Questions

Is the hash generator free with no limits?
Yes, Fixie's Hash Generator is completely free with no signup requirements, no file size limits (up to 100MB), and no restrictions on usage. All processing happens in your browser, so there are no server costs or usage limits.
Which hash algorithm should I use?
For security applications (password hashing, digital signatures), use SHA-256 or SHA-512 — these are cryptographically secure. Avoid MD5 and SHA-1 for security purposes as they have known vulnerabilities. For simple file integrity checks or non-security use cases, MD5 is faster and works fine. For maximum security, use SHA-3 or BLAKE2.
Can I reverse a hash to get the original data?
No, hash functions are one-way — you cannot reverse a hash to recover the original data. This is by design and what makes hashes useful for password storage. However, for weak passwords, attackers can use rainbow tables (precomputed hash databases) to find matches, which is why strong passwords and salting are important.
Why are my file hashes different from the source?
If the hash you generate doesn't match the expected hash from the file source, the file has been modified, corrupted, or you downloaded an incorrect version. This could indicate a corrupted download, man-in-the-middle attack, or simply downloading the wrong file version. Re-download the file and verify again.
Is hashing the same as encryption?
No, hashing and encryption are different. Hashing is one-way (cannot be reversed) and produces fixed-length output regardless of input size. Encryption is two-way (can be decrypted with a key) and produces output similar in size to the input. Hashing is for integrity verification and password storage, while encryption is for confidentiality.

Related Tools