Generadores de hash
MD5 hash generator
Try it
MD5 digest (crypto-js) — not for security.
Loading…
How to use this tool, examples, and related tips.
Type or paste your input string into the field.
The MD5 hash is computed instantly and displayed as a 32-character hexadecimal string.
Copy the hash for your intended use case.
MD5 (Message Digest Algorithm 5) is a hash function designed by Ron Rivest in 1991, producing a 128-bit (16-byte) digest represented as a 32-character hex string. MD5 was once widely used for checksums, digital signatures, and password hashing. However, MD5 is cryptographically broken — practical collision attacks have been known since 2004, and it has been demonstrated that an attacker can construct two different inputs with the same MD5 hash in seconds on commodity hardware. MD5 is no longer suitable for any security-sensitive purpose. It remains in use for non-cryptographic checksums, legacy system compatibility, and fast deduplication where collision resistance is not a security requirement.
Non-security checksums — MD5 is still widely used for verifying accidental data corruption (not intentional tampering) in file transfers and downloads.
Legacy system compatibility — Some older systems, databases, and APIs still use MD5 identifiers or checksums that you need to replicate or verify.
Deduplication keys — MD5 is fast and compact, making it acceptable as a deduplication hash in contexts where collision attacks are not a threat model.
Learning and comparison — Compare MD5 output length and speed against SHA-2 variants to understand the trade-offs between hash function generations.
Answers about this tool and how your data is handled.
No — under any circumstances. MD5 is both cryptographically broken (collision attacks) and fast (brute-force attacks). Billions of MD5 hashes per second are achievable on consumer hardware. Never use MD5 for password storage. Use bcrypt, Argon2, or scrypt.
For detecting accidental corruption — yes, it is still widely used. For detecting intentional tampering by an attacker — no. An attacker can craft a malicious file with the same MD5 hash as a legitimate one.
Always 32 hexadecimal characters, representing 128 bits.
No. Hashing runs entirely in your browser. Nothing is uploaded.
SHA-256 for integrity verification and digital signatures. Bcrypt or Argon2 for passwords. SHA-3 where algorithm diversity is required.
Même catégorie d’abord, puis d’autres utilitaires.
Generadores de hash
MD5 digest (crypto-js) — not for security.