Recuro.

Hash Generator

Generate cryptographic hashes instantly.

Processed entirely in your browser — no data sent to any server.
Output:
SHA-1 (20 bytes)
SHA-256 (32 bytes)
SHA-384 (48 bytes)
SHA-512 (64 bytes)

Generating hashes for webhook verification?

Recuro signs every webhook delivery with HMAC-SHA256 automatically. Built-in integrity verification.

Get started free

What are hash functions?

A cryptographic hash function takes an arbitrary-length input and produces a fixed-length output (the "hash" or "digest"). Good hash functions have three properties: they are deterministic (same input always produces the same output), they are one-way (you cannot derive the input from the output), and they are collision-resistant (it is infeasible to find two different inputs that produce the same output).

Hashes are used everywhere in software: verifying file integrity (checksums), storing passwords securely (with salting), digital signatures, blockchain, and data deduplication. The SHA-2 family (SHA-256, SHA-384, SHA-512) is the current standard for most applications.

SHA-1 produces a 160-bit hash and is considered weak against collision attacks (a collision was demonstrated in 2017). It is included here for compatibility with legacy systems but should not be used for new security applications. SHA-256 is the most widely used — it secures TLS connections, Git commits, and Bitcoin transactions.

Verifying webhook payload integrity? Use HMAC with a shared secret. Try our HMAC Signature Verifier, or let Recuro handle scheduled HTTP requests with built-in verification.

Frequently Asked Questions

Why is MD5 not included?

MD5 is cryptographically broken — collision attacks can be performed in seconds on modern hardware. It is also not available in the Web Crypto API, which this tool uses. For any security-sensitive hashing, use SHA-256 or stronger. MD5 should only be used for non-security purposes like checksums where collision resistance is not required.

What's the difference between SHA-256 and SHA-512?

SHA-256 produces a 256-bit (32-byte) hash, while SHA-512 produces a 512-bit (64-byte) hash. SHA-512 has a larger security margin and is actually faster on 64-bit processors because it operates on 64-bit words natively. Both are considered secure for current applications. SHA-256 is more common in protocols like TLS and Bitcoin.

Can I reverse a hash?

No. Cryptographic hash functions are one-way functions by design — they are computationally infeasible to reverse. Given a hash output, there is no practical way to determine the original input. This property is what makes hashes useful for password storage, integrity verification, and digital signatures.

⌘Enter to run  ·  ⌘⇧C to copy

Next steps