Integrity toolkit
Hash Generator for SHA-1/256/384/512
Paste any payload, choose your digest algorithm, switch between lowercase/uppercase hex or Base64, and capture execution metrics. Everything runs locally via the Web Crypto API so secrets never leave your browser.
Author · Pawan
Reviewer · Kushal Singh
Data never leaves your browser. For production secrets, run the same digest on a workstation without screen recorders.
Letter case
Quick presets
Digest summary
Benchmarks refresh every time you click generate.
Hash output
—
Digest length
—
Execution time
—
Algorithm
—
Powered by SubtleCrypto.digest()
Storage snapshot
We save the last run locally so you can pick up where you left off.
Algorithm quick sheet
- SHA-1
- 160-bit output. Collision attacks exist—legacy only.
- SHA-256
- 256-bit output. Default for file integrity and APIs.
- SHA-384
- 384-bit output. Use for high-assurance TLS configs.
- SHA-512
- 512-bit output. Longer digest for tamper-resistant logs.
Hash output will appear here once you run the calculator.
Implementation checklist
- Pre-hash hygiene: Trim whitespace, normalize encodings (UTF-8), and log who triggered the hash.
- Salt & stretch passwords: Hashing alone is not enough. Layer PBKDF2, bcrypt, scrypt, or Argon2.
- Compliance targeting: Many regulated workloads forbid SHA-1. Confirm FIPS 140-3 or PCI rules before storing digests.
- Export trail: Use the JSON/CSV buttons as evidence in change tickets and incident reports.
FAQ
Is SHA-1 still supported?
Yes for legacy compatibility, but the calculator labels it as weakened. Prefer SHA-256 or stronger for any new workload.
How do I hash files instead of text?
Drop the file into your browser console and pass the ArrayBuffer into crypto.subtle.digest. We focus on text blobs to stay lightweight.
Why does Base64 output change length?
Base64 encodes every 3 bytes as 4 characters. Different digest sizes (160–512 bits) therefore create different Base64 lengths while preserving entropy.
References
Author & Reviewer
Pawan builds developer calculators at CalcArena with a focus on frictionless security tooling. He validates formulas against NIST publications and adds exportable audit trails for engineering teams.
Reviewed by Kushal Singh, AI Research Program Manager, for alignment with current SHA guidance.