Loading
Preparing the page...
Loading
Preparing the page...
Learn how hashing works and why tiny input changes can produce completely different outputs. Includes a simple entropy estimate and an avalanche demo.
Maximum 100 KB
SHA-1 is included for learning and compatibility only. Use SHA-256, SHA-384, or SHA-512 for modern systems.
Download results as PDF, CSV, or JSON.
Run the tool to enable exports.
A cryptographic hash function takes an input of any size and produces a fixed-size output (digest). SHA-256 always produces a 256-bit (64 hex character) output, regardless of whether you hash a single character or an entire file.
A key property of secure hash functions is the avalanche effect. Changing even a single bit of the input completely changes the output. This makes it impossible to predict how the hash will change or to find inputs that produce similar hashes.