Generate cryptographic hashes (SHA-256, SHA-512, SHA-1) from text or files. Compare hashes to verify data integrity. Uses the Web Crypto API — nothing leaves your browser.
A hash function takes input data and produces a fixed-size string of characters. Even a tiny change in input produces a completely different hash. Hashes are used for:
\u2022 Data integrity — verify files haven't been tampered with
\u2022 Password storage — store hashes instead of plain passwords
\u2022 Digital signatures — sign and verify documents
\u2022 Checksums — detect data corruption during transfer