What does this hash generator do?
Cryptographic hashes map arbitrary data to a fixed-length fingerprint, usually shown as hexadecimal. They are used for checksums, deduplication, HMAC message authentication, and (for legacy systems) password storage — though modern apps should prefer slow password hashes such as Argon2 or bcrypt. This tool computes one or more digests at once so you can compare a download against a published SHA-256, verify API signatures with HMAC, or quickly fingerprint a file without installing OpenSSL.
Supported algorithms and modes
- MD5: 128-bit digest via a local JavaScript implementation (simple digest only).
- SHA-1, SHA-256, SHA-384, SHA-512: computed with the browser’s Web Crypto API (SubtleCrypto.digest).
- Optional HMAC mode: for each enabled SHA algorithm, an HMAC with your UTF-8 secret key and the same hash function. MD5 does not support HMAC in this UI and shows a placeholder when selected with HMAC on.
Text vs file input
Switch between Text and File. Text is UTF-8 encoded before hashing. File reads the raw bytes with FileReader into memory — useful for installers, images, or logs. Click Generate hashes after choosing which algorithms to include. Results appear in a table with per-row copy buttons. Clear resets input, file selection, results, and hints.
Privacy and browser requirements
All hashing runs client-side in your tab. Data is not sent to Dynamic Duniya servers. Web Crypto digest and HMAC require a secure context (HTTPS or localhost); if hashing fails, try a supported browser over HTTPS.