A "Hash" is the digital fingerprint of data. Whether it's a small password like "123456" or a 10GB ISO file, a hash function turns it into a fixed-length string of characters.
The Hash Generator allows you to compute these fingerprints instantly accurately.
Why Can't I Decrypt a Hash?
Hashing is a one-way function. You can turn "Apple" into 1f3870..., but you cannot turn 1f3870... back into "Apple" via a mathematical formula. This is different from Encryption (which has a key to lock and unlock).
Think of it like a blender. You can turn strawberries into a smoothie, but you can't turn a smoothie back into strawberries.
Supported Algorithms
MD5 (Message Digest 5)
Fast but broken. It is vulnerable to "collision attacks" (where two different files produce the same hash). Only use this for checking file integrity (checksums), NEVER for passwords.
SHA-1 (Secure Hash Algorithm 1)
Also broken. Google famously created a collision for SHA-1 in 2017 (SHAttered).
SHA-256
The industry standard. Used by Bitcoin, SSL certificates, and modern password storage. It is currently considered secure.
Use Cases
1. Verifying File Integrity
You download a program from the internet. How do you know it hasn't been tampered with by a hacker? Often, the developer provides a SHA-256 hash. You can hash your downloaded file and compare it. If they match, the file is identical.
2. Storing Passwords
Databases should never store passwords in plain text. They store the hash. When you log in, the system hashes your input and checks if it matches the stored hash.