مولد تجزئة MD5 & ؛ مولد تجزئة MD5 & ؛ SHA مجاني على الإنترنت
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 hashes.
Result
About Hash Functions
A cryptographic hash function takes an input of any size and produces a fixed-size output (the "hash" or "digest"). The same input always produces the same hash, but even a tiny change in the input produces a completely different hash. Hash functions are one-way · you cannot reverse a hash to get the original input.
Algorithm Comparison
| Algorithm | Output | Security |
|---|---|---|
| MD5 | 128-bit (32 hex chars) | Broken · not for security |
| SHA-1 | 160-bit (40 hex chars) | Weak · deprecated |
| SHA-256 | 256-bit (64 hex chars) | Strong · recommended |
| SHA-384 | 384-bit (96 hex chars) | Strong |
| SHA-512 | 512-bit (128 hex chars) | Strong |
Frequently Asked Questions
What is MD5 used for if it's broken?
MD5 is still widely used for non-security purposes: file integrity checks (verifying downloads), deduplication, cache keys, and checksums. It should never be used for password hashing or digital signatures.
Can I reverse a hash to get the original text?
No. Hash functions are designed to be one-way. However, attackers use precomputed tables (rainbow tables) to look up common hashes. This is why passwords should be hashed with salted, slow hash functions like bcrypt, not raw SHA-256.
Is my file uploaded when I hash it?
No. The file is read directly in your browser using the File API and hashed locally using the Web Crypto API (for SHA) or a pure JavaScript implementation (for MD5). Nothing is sent to any server.