Skip to main content

Hash Generator

Compute MD5, SHA-1, SHA-256 and SHA-512 in one click

Need to verify text integrity or generate a cryptographic fingerprint? Paste your text below and get 4 hashes simultaneously.

4 algorithms at once

MD5, SHA-1, SHA-256 and SHA-512 computed in a single call. No need to rerun for each algorithm.

Per-algorithm copy

Each hash has its own copy button. Copy only the digest you need.

Lowercase hexadecimal

Digests are displayed in lowercase hex, the standard format used by system tools.

100% free

No signup required. Compute as many hashes as you need with no usage limits.

Native UTF-8

Hashes are computed on the UTF-8 bytes of the text. Accents, emojis and special characters are fully supported.

Why compute a hash online?

A cryptographic hash transforms text of arbitrary length into a fixed-size fingerprint. It is a fundamental tool for verifying data integrity, comparing content and generating fingerprints.

Three main use cases:

  • Verify integrity - Compare the hash of received text with the expected hash to detect any modification
  • Generate a fingerprint - Create a unique identifier from content (cache key, deduplication)
  • Debug protocols - Verify SHA-256 hashes used in DKIM, DANE/TLSA or TLS certificates

How to use the hash generator in 3 steps

Step 1: Enter your text

Paste or type the text you want to hash:

v=spf1 include:_spf.captaindns.com ~all

Step 2: Compute hashes

Click "Compute hashes" or use the shortcut ⌘+⏎ (Mac) / Ctrl+⏎ (Windows). All 4 algorithms run simultaneously.

Step 3: Copy the results

Each hash is displayed with its algorithm label and an individual copy button. Copy only the digest you need.


What is a cryptographic hash?

A hash function transforms an input of arbitrary size into a fixed-size digest. Fundamental properties:

  • Deterministic: the same input always produces the same hash
  • Fast: computation is nearly instantaneous
  • Collision-resistant: it is extremely difficult to find two inputs with the same hash
  • Avalanche effect: changing a single character radically changes the hash

SHA-256 example:

InputSHA-256 hash (start)
hello2cf24dba5fb0a30e...
Hello185f8db32271fe25...
hello (space)6b1e2a5c5d21af0e...

A single character change completely alters the digest.


Supported algorithms

AlgorithmDigest sizeSecurityTypical use
MD5128 bits (32 hex)Broken (known collisions)Legacy, non-crypto checksums
SHA-1160 bits (40 hex)Deprecated (collisions found)Legacy, Git commits
SHA-256256 bits (64 hex)SecureDKIM, DANE/TLSA, TLS certificates
SHA-512512 bits (128 hex)SecureSignatures, DANE/TLSA

Recommendation: use SHA-256 for everyday use. SHA-512 if you need extra security margin.


Real-world use cases

Verify DNS record integrity

Situation: You modify an SPF record and want to verify it was not altered during propagation.

Action: Compute the SHA-256 hash of your record before and after propagation. If the hashes match, the content is identical.

Generate a cache fingerprint

Situation: Your application uses content-based cache keys.

Action: Compute the MD5 or SHA-256 hash of the content to generate a unique key. Two identical contents always produce the same key.

Debug a DANE/TLSA record

Situation: Your TLSA record contains a SHA-256 hash of the certificate.

Action: Compare the hash in the record with the one computed from your certificate to detect a mismatch.


Verify a hash from the command line

To compare this tool's results with your system:

# SHA-256
echo -n "hello world" | sha256sum

# MD5
echo -n "hello world" | md5sum

# SHA-1
echo -n "hello world" | sha1sum

# SHA-512
echo -n "hello world" | sha512sum

The -n flag is essential: it prevents echo from adding a newline that would change the hash.


❓ FAQ - Frequently asked questions

Q: What is a cryptographic hash?

A: A hash is a fixed-size fingerprint computed from text. It is deterministic (same input = same output), fast and collision-resistant. It is used to verify data integrity without revealing the original content.


Q: Is MD5 still safe?

A: No, MD5 is no longer considered safe for cryptography. Collisions were found as early as 2004. Use SHA-256 or SHA-512 for anything requiring cryptographic security. MD5 remains acceptable for non-critical checksums.


Q: What is the difference between SHA-256 and SHA-512?

A: SHA-256 produces a 256-bit digest (64 hex characters), SHA-512 a 512-bit digest (128 hex characters). Both are secure. SHA-512 is marginally faster on 64-bit processors but produces a longer digest.


Q: Are hashes reversible?

A: No. A hash is a one-way function. It is mathematically impossible to recover the original text from the hash. This is what makes hashes useful for integrity verification and password storage.


Q: What is the avalanche effect?

A: The avalanche effect means that a tiny change in the input (a single bit) radically changes the hash. This fundamental property guarantees that you cannot predict the hash of a similar text.


Q: Is the hash of an empty string valid?

A: Yes. The SHA-256 of an empty string is e3b0c44298fc1c149afbf4c8996fb924.... Each algorithm has its own hash for the empty input.


Complementary tools

ToolUse
Password GeneratorGenerate a password then compute its hash
Base64 EncoderEncode/decode text as Base64
Case ConverterNormalize text case before hashing
DKIM InspectorVerify DKIM signatures (uses SHA-256)
DNS LookupQuery DNS records for a domain

Useful resources


Privacy commitment

Your text is sent to the CaptainDNS API solely to compute the hashes. No content is stored. Only anonymous technical metrics are logged (character count, processing time).