SHA-256 / SHA-512 hash generator
Compute SHA-256, SHA-384, SHA-512, optional legacy SHA-1, and HMAC-SHA digests from UTF-8 text or a small file — in your browser with the Web Crypto API. Output as hex or Base64. Nothing is uploaded to our servers.
Algorithms (plain digest)
Output format
Optional HMAC (shared secret)
If set, we also compute HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 using your secret as UTF-8 bytes. This is not encryption — avoid production secrets on shared machines.
When a file is selected, Run hashes the file, not the text box.
Very large pastes may slow your browser; use a file or openssl / PowerShell for huge inputs.
Ctrl+Enter runs the hash.
| Algorithm | Digest |
|---|
Automate checksums. CloudyBot can pull artifacts, compare outputs, and alert on a schedule — so you are not manually hashing in a tab forever.
Try CloudyBot FreeFree plan · No credit card · 60-second setup
How cryptographic hashing works
A cryptographic hash function takes an arbitrary message (text or bytes) and produces a fixed-size digest. The same input always yields the same digest; a tiny change in input yields an unrelated digest. Hashes are one-way: you cannot recover the original message from the digest alone. That makes them useful for integrity checks — verifying that a download or config file was not corrupted or swapped — and for comparing artifacts without storing the full content.
SHA-256 and SHA-512 are part of the SHA-2 family and are widely used in APIs, TLS certificates, and package managers. SHA-384 is also SHA-2; it sits between them in output size and is common in enterprise policies. This tool computes digests using your browser’s built-in Web Crypto implementation so results match other standards-compliant tools when the same bytes are hashed.
UTF-8 matters for text. The same visible string must be encoded to bytes the same way everywhere. We hash the UTF-8 encoding of your textarea, matching what most command-line tools do with Unicode input. For files, we hash raw file bytes exactly as on disk — no line-ending conversion.
SHA-256 vs SHA-512 — which should you use?
For new systems, SHA-256 is the default choice: 256-bit output, excellent library support, and a long track record. SHA-512 produces a longer digest (512 bits) and can be preferred when policies or APIs ask for it; both are from the same family and are not “more secure” than the other in a casual sense — pick what your spec or team standard requires.
SHA-1 is available here only for legacy compatibility (old checksums, Git object ids in some contexts). It is not suitable for new security designs because collision attacks are practical for motivated attackers. Leave SHA-1 off unless you are verifying an existing SHA-1 value.
Hashing is not encryption. A digest does not hide your data. If you need confidentiality, use real encryption (and key management). If you need to store passwords, use a slow password hash (Argon2, bcrypt, scrypt) — not a single SHA-256 of the password.
HMAC vs plain SHA
HMAC (Hash-based Message Authentication Code) combines a secret key with your message using a hash function inside a defined construction. It answers: “Was this message produced by someone who knows the key?” It is used in APIs, webhooks, and signed URLs. It does not encrypt the message; anyone who can see the message can see it. When you enter a secret on this page, treat it like a password on a shared PC — we never send it to our servers, but shoulder-surfing still applies.
Common use cases
- Verify a download — compare the site’s published SHA-256 with what you compute locally.
- Debug API signatures — match HMAC-SHA-256 to what your backend expects (same key bytes, same message bytes).
- Config drift — hash a canonical file to detect accidental edits.
- Pair with other tools — compare with Base64 output from APIs or inspect tokens with the JWT decoder.
When this tool is the wrong choice
MD5 is not exposed in Web Crypto in browsers; for legacy MD5 checksums use openssl md5 or your language’s crypto library. Very large files (gigabytes) should use streaming tools on the command line — this page caps files at 2 MB to keep the tab responsive.
For structured data in transit, pair hashing with the rest of your security story: TLS, key rotation, and least-privilege access — not just a digest in isolation.
Want checksums in automated workflows?
Example: “Every night, download the release manifest, verify SHA-256, and message me if it changed.” That is the kind of repeatable work CloudyBot is built for.
Try CloudyBot FreeFree plan · No credit card · 60-second setup
Online hash generator for developers
People search for an online hash generator, SHA-256 calculator, or file checksum when they need a quick answer without installing software. This page keeps processing in the browser for privacy and shows both hex and Base64 so you can match API docs. For automation and recurring checks, see how CloudyBot runs tasks on a schedule.
Frequently asked questions
Is this hash generator free?
Yes. There is no signup. Use it for checksums and debugging as often as you need.
Is my text or file sent to CloudyBot servers?
No. Digests are computed in your browser using the Web Crypto API. DevTools Network should show no request carrying your paste or file for hashing.
Why is SHA-1 optional and off by default?
SHA-1 is no longer considered collision-resistant for security-sensitive uses. It remains useful for legacy Git or old checksums. Enable it only when you need compatibility, not for new designs.
What is the difference between SHA-256 and SHA-512?
Both are from the SHA-2 family. SHA-256 outputs 256 bits; SHA-512 outputs 512 bits. For new work, SHA-256 is the common default; SHA-512 is often used when larger digests are preferred. Neither replaces a password stored in a database — use proper key derivation or a dedicated secrets manager.
What is HMAC?
HMAC combines a hash function with a secret key. It proves integrity when both sides share the key. It is not encryption — anyone with the key can verify. Do not paste production API keys on shared computers.
Why is MD5 not included?
Browsers do not expose MD5 in the standard Web Crypto API. For MD5 compatibility, use openssl md5 or your language's crypto library locally.
What is CloudyBot?
CloudyBot is a hosted AI agent that can browse the web, use files, and run scheduled tasks. This page is a free utility; the product automates workflows end to end.
Related tools
Try CloudyBot on the free plan
30 AI Tasks / month · 2 browser sessions (10 min) · 50 MB storage · 7-day chat history
Start free — no credit card