Mode
Algorithm
Password
Password Hashing Basics
Hashing converts a password into a fixed-length string that cannot be reversed. When a user logs in, you hash their input and compare it to the stored hash. If they match, the password is correct. Good hashing uses salt (random data) to prevent rainbow table attacks.
SHA-256, SHA-512, and SHA-1
SHA-256 and SHA-512 are from the SHA-2 family and are recommended for general hashing. SHA-1 is older and broken for collision resistance but still used in legacy systems. For password storage, dedicated algorithms like bcrypt or Argon2 are preferred because they're deliberately slow.
When to Use This Tool
Use this tool to quickly hash strings for checksums, to verify a password against a known hash (e.g. from a config file), or to understand how hashing works. For production applications, implement bcrypt or Argon2 on your server. This client-side tool is for development, testing, and learning.
Frequently Asked Questions
Related Tools
Explore More Tools
Find this tool useful? Buy us a coffee to keep DuskTools free and ad-light.