Hash Generator
SHA-2 · SHA-3 · BLAKE2 · RIPEMD-160 · MD5 · PBKDF2 · scrypt · Argon2 · bcrypt · xxHash · MurmurHash3 · FNV-1a · CRC32 · Adler-32 · Whirlpool
Input
HMAC Mode
Enable to compute HMAC-SHA256/384/512 with a secret key.
KDF Settings
Salt: random-salt-here · PBKDF2: 100,000 iters · bcrypt cost: 12
Output Format
Output hex in uppercase (A–F)
Compare / Verify
Input Info
Input
13 chars
Size
13.0 B
Mode
Hash
Using BLAKE2s impl for preview
Simulated via SHA-512 composition
Approximated via iterated SHA-256 (full Argon2 needs WASM)
Approximated via iterated SHA-256 (full Argon2 needs WASM)
Approximated via iterated SHA-256 (full Argon2 needs WASM)
Approximated via iterated SHA-256/512 (full bcrypt needs WASM)
When to use what
Password storage
Memory-hard, slows brute-force
File integrity
Fast, collision resistant
Digital signatures
Standard for PKI/TLS/JWT
MAC / auth tokens
Keyed, forgery resistant
Key derivation
Stretches passwords to keys
Hash tables / speed
Non-crypto, very fast
Error detection
Detect accidental corruption
SHA algorithms use crypto.subtle. BLAKE2s, RIPEMD-160, MD5, CRC32, FNV-1a, MurmurHash3, xxHash are pure-JS. Argon2, bcrypt, scrypt are approximated — production use needs a WASM library. Nothing leaves your device.