Text to Key
Convert text to deterministic hash keys
Hash Algorithm
SHA-256 (256-bit)
SHA-1 (160-bit)
SHA-256 (256-bit)
SHA-384 (384-bit)
SHA-512 (512-bit)
Output256-bit
Hex Length64 chars
Deterministic: Same input always gives same output
About Hash Functions
Cryptographic hash functions convert arbitrary data into a fixed-size hexadecimal string. They are one-way functionsโyou cannot reverse the hash to get the original input.
SHA Algorithm Comparison
| Algorithm | Output (bits) | Hex Length | Security |
|---|---|---|---|
| SHA-1 | 160 | 40 | โ ๏ธ Deprecated |
| SHA-256 | 256 | 64 | โ Recommended |
| SHA-384 | 384 | 96 | โ Strong |
| SHA-512 | 512 | 128 | โ Maximum |
Use Cases
- Password hashing (with salt)
- Data integrity verification
- Deterministic ID generation
- Content-addressable storage
- Digital signatures