100% Private

Hash & Checksum Generator - MD5, SHA, CRC, MurmurHash

Cryptographic Hash Functions

Hash functions transform input of any size into fixed-length output. They're one-way functions — you can't reverse them to find the original input. Hashes are fundamental to security, file verification, and data integrity.

Common Uses

File verification — Compare hashes to detect corrupted downloads or file tampering.

Password storage — Store hashes instead of passwords (with proper salting).

Data deduplication — Identify identical files without comparing full content.

Embedded systems — CRC8/16 for sensor data, serial protocols, and memory-constrained devices.

Algorithm Selection

For security: SHA-256/384/512 for file integrity and authentication.

For speed: MurmurHash, xxHash for hash tables and caching.

For embedded: CRC8 for Arduino, CRC16 for Modbus, CRC32 for files.

For legacy: MD5, MD2, MD4, Tiger, Whirlpool for older systems.

Privacy Notice: This site works entirely in your browser. We don't collect or store your data. Optional analytics help us improve the site. You can deny without affecting functionality.