How to Generate MD5, SHA-256, and Other Hashes Online
Cryptographic hash functions convert data into fixed-length strings (hashes) that uniquely identify that data. Hashes are used to verify file integrity, store passwords securely, create checksums, and generate unique identifiers. This guide shows you how to generate MD5, SHA-256, and other hashes using fixie.tools — a free browser-based tool that supports multiple hash algorithms, works with text and files, and requires no signup.
Step 1: Open the Hash Generator
Navigate to fixie.tools/hash in your web browser. The tool runs entirely in your browser for privacy — no data is uploaded to servers. All hash generation happens locally on your device. No account or software installation is required.
Step 2: Choose Your Hash Algorithm
Select the hash algorithm you want to use from the dropdown menu. Common options include MD5 (128-bit, fast but not cryptographically secure), SHA-1 (160-bit, deprecated for security), SHA-256 (256-bit, widely used and secure), SHA-512 (512-bit, maximum security), and others like SHA-3, BLAKE2, and RIPEMD. For password hashing or security purposes, use SHA-256 or higher. For file integrity checks, any algorithm works.
Step 3: Enter Your Data
Choose whether you want to hash text or a file. For text hashing, paste or type your text into the input field — this is useful for generating password hashes, creating unique identifiers from strings, or hashing API keys. For file hashing, click to upload a file — this is useful for verifying file integrity, checking download authenticity, or generating file checksums. Files up to 100MB are supported.
Step 4: Generate the Hash
Click the generate button to create the hash. Hash generation is instant for text and takes a few seconds for large files. The tool displays the hash in hexadecimal format (the standard representation). For files, you can see the hash update in real-time as the file is processed, which is helpful for large files.
Step 5: Copy and Verify
Use the copy button to copy the hash to your clipboard. If you're verifying a file download, compare the generated hash with the expected hash provided by the file source — they should match exactly. Even a single changed byte results in a completely different hash. The tool also supports batch hashing to generate multiple hash types simultaneously for comparison.