Instructions: Enter text below and click the buttons to see how different hashing algorithms work.
Use the "Hash Only" button for standard hashing, or "Hash + HMAC" for authenticated hashing with a key.
CRC32
32-bit | Error Detection
⚠️ Not cryptographically secure - use only for error detection
MD5
128-bit | Deprecated
⚠️ Vulnerable to collision attacks - deprecated for security use
SHA-1
160-bit | Deprecated
⚠️ Collision attacks demonstrated - being phased out