Generate cryptographic hashes (SHA1, SHA256, SHA512) and verify hash integrity.
SHA-1 produces a 160-bit hash. It's deprecated for security-critical applications but still used in some legacy systems.
SHA-256 is part of the SHA-2 family and produces a 256-bit hash. It's widely used and considered secure for most applications.
SHA-512 produces a 512-bit hash and is part of the SHA-2 family. It provides stronger security than SHA-256 and is recommended for high-security applications.
All hashing is performed locally in your browser using the Web Crypto API. No data is transmitted to any server. For production use, prefer SHA-256 or SHA-512 over SHA-1. This tool is for educational and verification purposes.